VYPR
High severity7.1NVD Advisory· Published Jul 16, 2025· Updated Apr 23, 2026

CVE-2025-52777

CVE-2025-52777

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in cmsMinds Pay with Contact Form 7 pay-with-contact-form-7 allows Reflected XSS.This issue affects Pay with Contact Form 7: from n/a through <= 1.0.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS vulnerability in WordPress Pay with Contact Form 7 plugin (<=1.0.4) allows attackers to inject malicious scripts via user interaction.

Vulnerability

Type and Root Cause CVE-2025-52777 is a reflected Cross-Site Scripting (XSS) vulnerability in the cmsMinds 'Pay with Contact Form 7' WordPress plugin (versions up to and including 1.0.4) [1]. The issue stems from improper neutralization of user-supplied input during web page generation, allowing an attacker to inject arbitrary HTML and JavaScript code [1].

Exploitation

Requirements Successful exploitation requires user interaction; for example, a privileged user (such as a site administrator) must click a malicious link or visit a specially crafted page [1]. No authentication is required from the attacker to deliver the payload, but the victim must perform a specific action [1].

Potential

Impact If exploited, an attacker can execute arbitrary scripts in the context of the victim's browser [1]. This can lead to session hijacking, redirection to malicious sites, injection of unwanted advertisements, or theft of sensitive information. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns targeting thousands of WordPress sites [1].

Mitigation

Status Patchstack has issued a mitigation rule to block attacks until an official patch can be safely applied [1]. The recommended immediate action is to update the plugin beyond version 1.0.4 as soon as a fix is available [1]. If an update cannot be applied, administrators should consult their hosting provider or web developer for alternative protection [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.