Ultra Addons for Contact Form 7 Vulnerability (Medium) – CVE-2026-2…

Ultra Addons for Contact Form 7 Vulnerability (Medium) – CVE-2026-2…

by | Feb 10, 2026 | Plugins

Attack Vectors

CVE-2026-24945 affects the WordPress plugin Ultra Addons for Contact Form 7 (slug: ultimate-addons-for-contact-form-7) in versions up to and including 3.5.34. The issue is categorized as a missing authorization (“missing capability check”), which means a site function can be reached without the normal permission controls in place.

From a business-risk perspective, the most important takeaway is that this is described as exploitable by unauthenticated attackers (no login required). With a Medium severity rating (CVSS 5.3), it’s the kind of vulnerability that can be tested quickly by opportunistic attackers scanning for exposed WordPress sites and known plugin versions.

Security Weakness

The weakness is a missing capability check on a plugin function. In plain terms: the plugin does not consistently verify that a requester has the right permissions before allowing a sensitive action to run.

Because the report indicates “unauthorized access” and “unauthenticated attackers,” the risk is not limited to compromised user accounts. Instead, it can be triggered directly from the public internet when the vulnerable plugin version is installed and reachable.

Technical or Business Impacts

Even when the disclosed CVSS vector indicates no confidentiality impact and no availability impact (C:N/A:N) with a low integrity impact (I:L), an unauthorized action can still create real operational and reputational risk. For marketing and revenue teams, the concern is disruption to lead flow, form performance, or on-site experiences tied to Contact Form 7 workflows.

For executives and compliance stakeholders, the bigger issue is control: a publicly reachable function that should be permission-gated can undermine governance and increase incident response burden. It can also trigger downstream impacts such as unplanned campaign interruptions, emergency maintenance windows, and increased scrutiny from customers or auditors if site integrity is questioned.

Remediation is straightforward: update Ultra Addons for Contact Form 7 to version 3.5.35 or newer patched versions. Prioritize this update in standard patch cycles, and confirm your WordPress update process covers plugin dependencies tied to customer acquisition and contact channels.

Similar Attacks

Authorization and access-control gaps in WordPress plugins are a common theme in real-world incidents. Examples of widely reported plugin-related security events include the 2021 mass exploitation of the WordPress plugin “Fancy Product Designer” (Wordfence report) and the 2023 large-scale exploitation of a critical flaw in “Essential Addons for Elementor” (Wordfence report).

These cases reinforce a practical lesson for business owners: plugin vulnerabilities can move quickly from disclosure to active exploitation, especially when they are remotely reachable. Keeping plugins updated—particularly those connected to lead capture and customer communications—reduces avoidable risk.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers