VYPR
Medium severity5.3NVD Advisory· Published Jun 20, 2025· Updated Apr 23, 2026

CVE-2025-49988

CVE-2025-49988

Description

Missing Authorization vulnerability in Renzo Johnson Contact Form 7 AWeber Extension integrate-contact-form-7-and-aweber allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form 7 AWeber Extension: from n/a through <= 0.1.40.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Contact Form 7 AWeber Extension plugin for WordPress (<= 0.1.40) lacks proper authorization checks, allowing unauthenticated exploitation of incorrectly configured access controls.

The Contact Form 7 AWeber Extension plugin for WordPress, versions 0.1.40 and earlier, contains a Missing Authorization vulnerability. This flaw allows an attacker to exploit incorrectly configured access control security levels within the plugin, effectively bypassing intended permission checks [1].

Attackers can trigger this vulnerability without requiring any prior authentication or special privileges. The plugin fails to properly verify user capabilities before executing certain functions, making it possible for unauthenticated visitors to perform actions reserved for higher-privileged users [1]. This type of broken access control is particularly dangerous in WordPress environments where plugin functions are often accessible through admin-ajax or direct calls.

A successful exploit could allow an attacker to modify plugin settings, access subscription data, or perform other unauthorized actions within the AWeber integration. While the CVSS score (5.3 Medium) suggests moderate impact, such vulnerabilities are known to be used in mass-exploit campaigns targeting thousands of websites simultaneously [1].

The vulnerability has been patched in version 0.1.43 of the plugin. Users are strongly advised to update immediately or enable auto-updates for vulnerable plugins. If immediate updating is not possible, site administrators should consider temporarily disabling the plugin or consulting with their hosting provider for alternative mitigation steps [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.