CVE-2025-2883

5.3 MEDIUM

📋 TL;DR

The Accept SagePay Payments Using Contact Form 7 WordPress plugin exposes sensitive server information through a publicly accessible phpinfo.php script. This allows unauthenticated attackers to view PHP configuration details, environment variables, and potentially sensitive data. All WordPress sites using this plugin version 2.0 or earlier are affected.

💻 Affected Systems

Products:
  • Accept SagePay Payments Using Contact Form 7 WordPress plugin
Versions: All versions up to and including 2.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with this specific plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain database credentials, API keys, or other secrets from PHP environment variables, leading to complete system compromise, data theft, or financial fraud.

🟠

Likely Case

Attackers gather server configuration details, PHP settings, and environment information that could be used for further attacks or reconnaissance.

🟢

If Mitigated

Limited exposure of non-sensitive PHP configuration details with no access to critical secrets.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only accessing the vulnerable URL path. The vulnerability is trivial to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.0 (check plugin repository for latest)

Vendor Advisory: https://wordpress.org/plugins/accept-sagepay-payments-using-contact-form-7/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Accept SagePay Payments Using Contact Form 7'. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove the plugin.

🔧 Temporary Workarounds

Remove vulnerable file

linux

Delete the publicly accessible phpinfo.php file from the plugin directory

rm /path/to/wordpress/wp-content/plugins/accept-sagepay-payments-using-contact-form-7/inc/front/template/cfspzw-info.php

Block access via .htaccess

all

Add rule to block access to the vulnerable file

<Files "cfspzw-info.php">
    Order Allow,Deny
    Deny from all
</Files>

🧯 If You Can't Patch

  • Immediately deactivate and remove the plugin from WordPress
  • Implement web application firewall rules to block access to /wp-content/plugins/accept-sagepay-payments-using-contact-form-7/inc/front/template/cfspzw-info.php

🔍 How to Verify

Check if Vulnerable:

Access https://your-site.com/wp-content/plugins/accept-sagepay-payments-using-contact-form-7/inc/front/template/cfspzw-info.php - if it shows PHP configuration page, you're vulnerable.

Check Version:

wp plugin get accept-sagepay-payments-using-contact-form-7 --field=version

Verify Fix Applied:

Attempt to access the same URL after patching - should return 404 or access denied.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 requests to cfspzw-info.php
  • Unusual traffic to plugin directory

Network Indicators:

  • GET requests to /wp-content/plugins/accept-sagepay-payments-using-contact-form-7/inc/front/template/cfspzw-info.php

SIEM Query:

url:*/cfspzw-info.php AND http_status:200

🔗 References

📤 Share & Export