The Contact Form 7 plugin for WordPress is vulnerable to Order Replay in all versions up to, and including, 6.0.5 via the 'wpcf7_stripe_skip_spam_check' function due to insufficient validation on a user controlled key. This makes it possible for unauthenticated attackers to reuse a single Stripe PaymentIntent for multiple transactions. Only the first transaction is processed via Stripe, but the plugin sends a successful email message for each transaction, which may trick an administrator into fulfilling each order.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Apr 2025 05:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Contact Form 7 plugin for WordPress is vulnerable to Order Replay in all versions up to, and including, 6.0.5 via the 'wpcf7_stripe_skip_spam_check' function due to insufficient validation on a user controlled key. This makes it possible for unauthenticated attackers to reuse a single Stripe PaymentIntent for multiple transactions. Only the first transaction is processed via Stripe, but the plugin sends a successful email message for each transaction, which may trick an administrator into fulfilling each order. | |
Title | Contact Form 7 <= 6.0.5 - Order Replay Vulnerability | |
Weaknesses | CWE-354 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-04-16T13:23:45.320Z
Reserved: 2025-04-04T00:06:57.248Z
Link: CVE-2025-3247

Updated: 2025-04-16T13:23:36.712Z

Status : Awaiting Analysis
Published: 2025-04-16T06:15:42.933
Modified: 2025-04-16T13:25:37.340
Link: CVE-2025-3247

No data.