Critical severity9.1NVD Advisory· Published Jul 15, 2025· Updated Apr 8, 2026
CVE-2025-7341
CVE-2025-7341
Description
The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the temp_file_delete() function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Affected products
1- cpe:2.3:a:hasthemes:download_contact_form_7_widget_for_elementor_page_builder_\&_gutenberg_blocks:*:*:*:*:*:wordpress:*:*Range: <2.2.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- plugins.trac.wordpress.org/changeset/3326887/ht-contactform/trunk/admin/Includes/Ajax.phpnvdPatch
- www.wordfence.com/threat-intel/vulnerabilities/id/32da04ba-bee3-4fd3-b91b-57e588d5f4e4nvdThird Party Advisory
- plugins.trac.wordpress.org/browser/ht-contactform/trunk/admin/Includes/Services/FileManager.phpnvdProduct
News mentions
0No linked articles in our index yet.