{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T01:57:09.130","vulnerabilities":[{"cve":{"id":"CVE-2026-0825","sourceIdentifier":"security@wordfence.com","published":"2026-01-28T07:16:00.133","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the CSV export functionality in all versions up to, and including, 1.4.5. This makes it possible for unauthenticated attackers to download sensitive form submission data containing personally identifiable information (PII) by accessing the CSV export endpoint with an export key that is exposed in publicly accessible page source code. The vulnerability is created because while the shortcode properly filters displayed entries by user, the CSV export handler completely bypasses this filtering and exports all entries regardless of user permissions."},{"lang":"es","value":"El plugin Database para Contact Form 7, WPforms, formularios de Elementor para WordPress es vulnerable a una elusión de autorización debido a la falta de comprobaciones de capacidad en la funcionalidad de exportación CSV en todas las versiones hasta la 1.4.5, ambas inclusive. Esto hace posible que atacantes no autenticados descarguen datos sensibles de envío de formularios que contienen información de identificación personal (PII) al acceder al endpoint de exportación CSV con una clave de exportación que está expuesta en el código fuente de la página accesible públicamente. La vulnerabilidad se crea porque, mientras que el shortcode filtra correctamente las entradas mostradas por usuario, el manejador de exportación CSV elude completamente este filtrado y exporta todas las entradas independientemente de los permisos del usuario."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/contact-form-entries/tags/1.4.5/contact-form-entries.php#L76","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/contact-form-entries/trunk/contact-form-entries.php#L301","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/contact-form-entries/trunk/contact-form-entries.php#L76","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/contact-form-entries/trunk/templates/leads-table.php#L10","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3442962%40contact-form-entries&new=3442962%40contact-form-entries&sfp_email=&sfph_mail=","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/4048ae11-fece-42aa-baf3-c636c4875635?source=cve","source":"security@wordfence.com"}]}}]}