प्लेटफ़ॉर्म
wordpress
घटक
ht-contactform
में ठीक किया गया
2.2.2
CVE-2025-7341 is an arbitrary file access vulnerability affecting the HT Contact Form – Drag & Drop Form Builder for WordPress plugin. This vulnerability allows unauthenticated attackers to delete arbitrary files on the server, potentially leading to remote code execution. The vulnerability impacts versions 0.0.0 through 2.2.1, and a patch is available in version 2.2.2.
The primary impact of CVE-2025-7341 is the ability for an unauthenticated attacker to delete files on the server. While the vulnerability is classified as arbitrary file access, the description explicitly states that deleting critical files like wp-config.php can lead to remote code execution. Successful exploitation would grant an attacker complete control over the WordPress installation, allowing them to modify content, install malicious plugins, steal sensitive data (database credentials, user information), and potentially pivot to other systems on the network. The ease of exploitation, combined with the plugin's popularity, makes this a high-risk vulnerability.
CVE-2025-7341 was publicly disclosed on 2025-07-15. While no public proof-of-concept (PoC) code has been released at the time of writing, the vulnerability's simplicity and potential for RCE suggest a high probability of exploitation. The vulnerability has been added to the CISA KEV catalog, indicating a significant risk to US critical infrastructure. Active campaigns targeting WordPress plugins are common, increasing the likelihood of exploitation.
Websites using the HT Contact Form plugin, particularly those with limited security configurations or outdated WordPress installations, are at significant risk. Shared hosting environments where users have limited control over server file permissions are also particularly vulnerable, as an attacker could potentially exploit this vulnerability to compromise the entire hosting account.
• wordpress / plugin: Use wp-cli plugin update to check the installed version and update if necessary.
• wordpress / plugin: Search plugin files for the tempfiledelete() function and any instances of insufficient file path validation.
• generic web: Monitor web server access logs for requests targeting plugin endpoints with unusual file paths or deletion attempts. Look for patterns like /wp-content/plugins/ht-contact-form/tempfiledelete.php?file=wp-config.php.
• generic web: Use curl to test for file deletion vulnerabilities by attempting to delete files via plugin endpoints.
curl -X POST "/wp-content/plugins/ht-contact-form/temp_file_delete.php?file=/path/to/sensitive/file" -d "param1=value1"disclosure
kev
एक्सप्लॉइट स्थिति
EPSS
0.67% (71% शतमक)
CISA SSVC
CVSS वेक्टर
The primary mitigation for CVE-2025-7341 is to immediately upgrade the HT Contact Form plugin to version 2.2.2 or later. If upgrading is not immediately feasible due to compatibility issues or testing requirements, consider temporarily restricting file access permissions on the server to limit the potential damage from file deletion. Web application firewalls (WAFs) configured to detect and block suspicious file deletion attempts targeting the plugin's endpoints could provide an additional layer of defense. Monitor WordPress logs for unusual file deletion activity.
इस असुरक्षित मनमाना फ़ाइल विलोपन को कम करने के लिए HT संपर्क फ़ॉर्म प्लगइन को संस्करण 2.2.2 या उच्चतर में अपडेट करें। यह अपडेट फ़ाइल पथों के अनुचित सत्यापन को ठीक करता है, जिससे अनाधिकृत हमलावरों को सर्वर पर संवेदनशील फ़ाइलों को हटाने से रोका जा सकता है।
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
CVE-2025-7341 is a CRITICAL vulnerability in the HT Contact Form WordPress plugin allowing unauthenticated attackers to delete files, potentially leading to remote code execution.
You are affected if you are using HT Contact Form versions 0.0.0 through 2.2.1. Check your plugin version immediately.
Upgrade the HT Contact Form plugin to version 2.2.2 or later to address the vulnerability. If immediate upgrade is not possible, implement temporary file access restrictions.
While no public exploits are currently available, the vulnerability's severity and ease of exploitation suggest a high probability of active exploitation.
Refer to the official HT Contact Form website and WordPress plugin repository for updates and advisories related to CVE-2025-7341.
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।