VYPR
Medium severity4.3NVD Advisory· Published Oct 27, 2025· Updated Apr 27, 2026

CVE-2025-62915

CVE-2025-62915

Description

Missing Authorization vulnerability in clicksend SMS Contact Form 7 Notifications by ClickSend clicksend-contactform7 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SMS Contact Form 7 Notifications by ClickSend: from n/a through <= 1.4.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in ClickSend SMS Contact Form 7 Notifications plugin <=1.4.0 allows unauthenticated attackers to exploit incorrectly configured access control, leading to unauthorized actions.

Vulnerability

Overview CVE-2025-62915 describes a Missing Authorization vulnerability in the WordPress plugin SMS Contact Form 7 Notifications by ClickSend (version 1.4.0 and earlier). The plugin fails to properly check access control security levels, meaning that unauthenticated users can trigger functions that should require higher privileges. This flaw stems from incorrectly configured access control, a classic broken access control issue [1].

Exploitation

Attackers can exploit this vulnerability without needing any authentication. The missing authorization allows an unprivileged attacker to call privileged functions within the plugin. This type of vulnerability is often targeted in mass-exploit campaigns, where attackers scan for vulnerable instances to attack thousands of websites regardless of their size or popularity [1].

Impact

By successfully exploiting this vulnerability, an attacker can perform actions that should be restricted to higher-privileged users, potentially leading to unauthorized modification of plugin settings, reading sensitive data, or other actions depending on the affected function. The CVSS score of 4.3 (Medium) reflects the moderate but real risk of an exposed, unauthenticated attack vector [1].

Mitigation

To remediate, users must update the plugin to a version newer than 1.4.0 as soon as possible. If an immediate update is not feasible, contacting the hosting provider or a web developer for assistance is recommended. As the vulnerability is actively used in campaigns, applying the patch is critical [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.