CVE-2025-6756

6.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in the Ultra Addons for Contact Form 7 WordPress plugin allows authenticated attackers with contributor-level access or higher to inject malicious scripts into website pages. The scripts execute whenever users visit compromised pages, potentially stealing credentials or performing unauthorized actions. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Ultimate Addons for Contact Form 7 WordPress plugin
Versions: All versions up to and including 3.5.21
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable plugin version and at least one contributor-level user account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access, deface websites, steal sensitive user data, or install backdoors for persistent access.

🟠

Likely Case

Session hijacking, credential theft from users visiting infected pages, or redirection to malicious sites.

🟢

If Mitigated

Limited to low-privilege user compromise if proper input validation and output escaping are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.22 or later

Vendor Advisory: https://wordpress.org/plugins/ultimate-addons-for-contact-form-7/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Ultimate Addons for Contact Form 7'. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.5.22+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable shortcode

all

Remove or disable the UACF7_CUSTOM_FIELDS shortcode usage across the site

Edit WordPress pages/posts to remove [UACF7_CUSTOM_FIELDS] shortcode references

Restrict user roles

all

Temporarily remove contributor-level access until patching

Navigate to Users → All Users in WordPress admin, downgrade contributor roles to subscriber

🧯 If You Can't Patch

  • Disable the entire Ultimate Addons for Contact Form 7 plugin
  • Implement web application firewall rules to block XSS payloads targeting the vulnerable shortcode

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins, find 'Ultimate Addons for Contact Form 7' and verify version is 3.5.21 or lower.

Check Version:

wp plugin list --name='ultimate-addons-for-contact-form-7' --field=version

Verify Fix Applied:

Confirm plugin version is 3.5.22 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress admin-ajax.php with UACF7_CUSTOM_FIELDS parameters
  • Multiple failed login attempts followed by successful contributor-level login

Network Indicators:

  • HTTP requests containing script tags in UACF7_CUSTOM_FIELDS parameters
  • Outbound connections to suspicious domains from WordPress pages

SIEM Query:

source="wordpress.log" AND ("UACF7_CUSTOM_FIELDS" AND ("script" OR "onerror" OR "javascript:"))

🔗 References

📤 Share & Export