CVE-2025-13384
📋 TL;DR
This vulnerability allows unauthenticated attackers to forge PayPal payment notifications in the CP Contact Form with PayPal WordPress plugin, marking form submissions as paid without actual payment. All WordPress sites using this plugin up to version 1.3.56 are affected. Attackers can manipulate payment status, transaction IDs, and payer emails through crafted requests.
💻 Affected Systems
- CP Contact Form with PayPal WordPress Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could mark all form submissions as paid, causing significant financial loss if the plugin is used for paid services, and potentially enabling unauthorized access to paid content or services.
Likely Case
Attackers mark individual form submissions as paid without payment, causing revenue loss for paid forms and undermining payment verification systems.
If Mitigated
With proper authentication and PayPal IPN validation, only legitimate PayPal notifications would be processed, preventing unauthorized payment confirmations.
🎯 Exploit Status
Exploitation requires sending crafted HTTP POST requests to the vulnerable endpoint with payment_status, txn_id, and payer_email parameters.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.57 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'CP Contact Form with PayPal'. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 1.3.57+ from WordPress.org and replace plugin files.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate cp-contact-form-with-paypal
Block Vulnerable Endpoint
linuxUse web application firewall or .htaccess to block access to the IPN endpoint
RewriteEngine On
RewriteCond %{QUERY_STRING} cp_contactformpp_ipncheck [NC]
RewriteRule ^ - [F,L]
🧯 If You Can't Patch
- Disable the CP Contact Form with PayPal plugin immediately
- Implement server-side validation of PayPal IPN signatures using custom code
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for CP Contact Form with PayPal version. If version is 1.3.56 or lower, you are vulnerable.
Check Version:
wp plugin get cp-contact-form-with-paypal --field=version
Verify Fix Applied:
After updating, verify plugin version shows 1.3.57 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests containing 'cp_contactformpp_ipncheck' parameter
- Unusual payment confirmations without corresponding PayPal transactions
- Multiple form submissions marked as paid in quick succession
Network Indicators:
- POST requests to WordPress site with cp_contactformpp_ipncheck parameter and payment_status/txn_id/payer_email fields
- Requests from non-PayPal IP addresses to payment confirmation endpoints
SIEM Query:
SELECT * FROM web_logs WHERE url_query LIKE '%cp_contactformpp_ipncheck%' AND http_method = 'POST'
🔗 References
- https://plugins.trac.wordpress.org/browser/cp-contact-form-with-paypal/tags/1.3.56/cp_contactformpp_functions.php#L541
- https://plugins.trac.wordpress.org/browser/cp-contact-form-with-paypal/tags/1.3.56/cp_contactformpp_functions.php#L877
- https://plugins.trac.wordpress.org/browser/cp-contact-form-with-paypal/tags/1.3.56/cp_contactformpp_functions.php#L925
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3399104%40cp-contact-form-with-paypal&new=3399104%40cp-contact-form-with-paypal&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6639c3d8-8f26-4ee5-8c4b-2efcf34668a2?source=cve