CVE-2026-25320

5.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthorized users to access contact form submission data stored by the Elementor Contact Form DB WordPress plugin due to missing authorization checks. It affects all WordPress sites running vulnerable versions of this plugin, potentially exposing sensitive user information submitted through contact forms.

💻 Affected Systems

Products:
  • Cool Plugins Elementor Contact Form DB (sb-elementor-contact-form-db)
Versions: All versions up to and including 2.1.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin enabled. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access all contact form submissions containing sensitive personal data, messages, and potentially credentials or other confidential information submitted by users.

🟠

Likely Case

Unauthorized access to contact form submissions, potentially exposing personal identifiable information (PII) and sensitive communications.

🟢

If Mitigated

With proper access controls, only authorized administrators can access form submissions, limiting exposure to legitimate users only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of the vulnerable endpoint but is straightforward once identified. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.4 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/sb-elementor-contact-form-db/vulnerability/wordpress-elementor-contact-form-db-plugin-2-1-3-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'Elementor Contact Form DB'
4. Click 'Update Now' if update available
5. If no update available, download version 2.1.4+ from WordPress repository
6. Deactivate old plugin, upload new version, activate

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate sb-elementor-contact-form-db

Restrict Access via .htaccess

linux

Block access to plugin directories via web server configuration

# Add to .htaccess in WordPress root:
<FilesMatch "\.(php|html?)$">
Order Deny,Allow
Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized access to plugin endpoints
  • Monitor access logs for unusual requests to contact form submission endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Elementor Contact Form DB version. If version is 2.1.3 or lower, you are vulnerable.

Check Version:

wp plugin get sb-elementor-contact-form-db --field=version

Verify Fix Applied:

Verify plugin version is 2.1.4 or higher in WordPress admin panel. Test access to form submission endpoints as unauthenticated user should be denied.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized GET/POST requests to /wp-content/plugins/sb-elementor-contact-form-db/ endpoints
  • Multiple failed authentication attempts followed by successful access to form data

Network Indicators:

  • Unusual traffic patterns to plugin-specific endpoints from unauthenticated sources

SIEM Query:

source="web_access_logs" AND (uri="/wp-content/plugins/sb-elementor-contact-form-db/" OR uri CONTAINS "sb-elementor-contact-form-db") AND status=200 AND NOT user_agent CONTAINS "admin"

🔗 References

📤 Share & Export