The Contact Form 7 plugin for WordPress is vulnerable to Order Replay in all versions up to, and including, 6.0.5 via the 'wpcf7_stripe_skip_spam_check' function due to insufficient validation on a user controlled key. This makes it possible for unauthenticated attackers to reuse a single Stripe PaymentIntent for multiple transactions. Only the first transaction is processed via Stripe, but the plugin sends a successful email message for each transaction, which may trick an administrator into fulfilling each order.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Jul 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rocklobster
Rocklobster contact Form 7 |
|
CPEs | cpe:2.3:a:rocklobster:contact_form_7:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Rocklobster
Rocklobster contact Form 7 |
Wed, 16 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Apr 2025 05:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Contact Form 7 plugin for WordPress is vulnerable to Order Replay in all versions up to, and including, 6.0.5 via the 'wpcf7_stripe_skip_spam_check' function due to insufficient validation on a user controlled key. This makes it possible for unauthenticated attackers to reuse a single Stripe PaymentIntent for multiple transactions. Only the first transaction is processed via Stripe, but the plugin sends a successful email message for each transaction, which may trick an administrator into fulfilling each order. | |
Title | Contact Form 7 <= 6.0.5 - Order Replay Vulnerability | |
Weaknesses | CWE-354 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-04-16T05:23:00.706Z
Updated: 2025-04-16T13:23:45.320Z
Reserved: 2025-04-04T00:06:57.248Z
Link: CVE-2025-3247

Updated: 2025-04-16T13:23:36.712Z

Status : Analyzed
Published: 2025-04-16T06:15:42.933
Modified: 2025-07-08T18:13:23.407
Link: CVE-2025-3247

No data.