CVE-2025-8280

Medium
|5.8
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to inject malicious scripts into a website's contact form, potentially compromising users who access the site through older web browsers. It occurs because the plugin doesn't properly handle a specific part of the website's address, making it easier for attackers to exploit this weakness.

Technical Description

The Contact Form 7 reCAPTCHA WordPress plugin through 1.2.0 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactLow
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$810($500-$1K)
Vendor Response
Grade FPatched in 185 days

Quick Information

Published

Sep 12, 2025

7 months ago

Last Modified

Mar 16, 2026

22 days ago

Vendor

iambriansreed

Product

contact form 7 recaptcha