CVE-2026-0825
Description
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the CSV export functionality in all versions up to, and including, 1.4.5. This makes it possible for unauthenticated attackers to download sensitive form submission data containing personally identifiable information (PII) by accessing the CSV export endpoint with an export key that is exposed in publicly accessible page source code. The vulnerability is created because while the shortcode properly filters displayed entries by user, the CSV export handler completely bypasses this filtering and exports all entries regardless of user permissions.
Affected products
2- Range: <=1.4.5
- Range: <=1.4.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- plugins.trac.wordpress.org/browser/contact-form-entries/tags/1.4.5/contact-form-entries.phpnvd
- plugins.trac.wordpress.org/browser/contact-form-entries/trunk/contact-form-entries.phpnvd
- plugins.trac.wordpress.org/browser/contact-form-entries/trunk/contact-form-entries.phpnvd
- plugins.trac.wordpress.org/browser/contact-form-entries/trunk/templates/leads-table.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/4048ae11-fece-42aa-baf3-c636c4875635nvd
News mentions
0No linked articles in our index yet.