CF7 7 Mailchimp Add-on Vulnerability (Medium) – CVE-2025-29012

CF7 7 Mailchimp Add-on Vulnerability (Medium) – CVE-2025-29012

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2025-29012 affects the CF7 7 Mailchimp Add-on WordPress plugin (slug: CF7-mailchimp-addon) in versions <= 2.2. Because the issue can be triggered without logging in and requires no user interaction, any site running a vulnerable version is potentially reachable from the public internet if WordPress is accessible.

From a business perspective, this type of weakness is commonly targeted because it can enable an outsider to perform an unauthorized action through a direct web request, bypassing normal administrative controls.

Security Weakness

The vulnerability is categorized as Missing Authorization (a missing capability check on a function). In plain terms, the plugin does not consistently verify that a request is coming from a user who is allowed to perform the action, which opens the door to unauthenticated misuse.

Severity is rated Medium with a CVSS 3.1 score of 5.3 (vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N), indicating the primary risk is integrity impact (unauthorized changes) rather than direct data theft or service outage. References: CVE record and Wordfence advisory.

Remediation: Update CF7 7 Mailchimp Add-on to version 2.4 or newer patched version, and confirm the update is applied across all environments (production, staging, and any campaign microsites).

Technical or Business Impacts

Because the defined impact is on integrity, the most relevant business risks are unauthorized changes that could affect marketing operations. Depending on what the exposed function controls, that may translate into unexpected behavior in your lead capture and subscriber workflows (for example, changes that affect how Contact Form 7 submissions are handled with Mailchimp), causing campaign disruption, list-quality issues, or misrouted subscriptions.

For marketing leadership and executives, the downstream costs can include lost revenue from broken funnel tracking, damage to sender reputation if subscription handling becomes unreliable, and compliance concerns if records and consent workflows are altered outside of authorized change control. Even when the issue is “only” Medium severity, it can still create a measurable incident response burden (triage, validation, remediation, stakeholder communications, and documentation for audit/compliance teams).

Similar attacks: Authorization-control failures are a recurring pattern across internet-facing platforms and have been widely exploited in other ecosystems—for example, Atlassian Confluence’s CVE-2023-22515 (“improper authorization”), which demonstrates how quickly missing/weak authorization checks can become a practical route to unauthorized changes.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers