UNKNOWN (0.0)
    Plugin

    Unauthorized Post Duplication Vulnerability in PDF for Contact Form 7 Plugin

    Published Date: 12/12/2025
    CVE ID: CVE-2025-14074

    Summary

    The PDF for Contact Form 7 + Drag and Drop Template Builder WordPress plugin is vulnerable to unauthorized post duplication in versions up to 6.3.3. This vulnerability arises from a missing capability check, allowing authenticated users with minimal access to duplicate sensitive posts.

    Vulnerability Details

    This vulnerability is caused by an oversight in the plugin's code, specifically within the 'rednumber_duplicate' function. It lacks proper capability checks, which inadvertently permits lower-privileged users, like those with Subscriber-level access, to duplicate posts. These can include sensitive ones marked as private or password-protected. The lack of appropriate permission verification means that users without sufficient clearance can access and replicate confidential content, potentially leading to information leakage. This vulnerability can be especially concerning for websites that rely on user-role management to protect sensitive posts. An attacker leveraging this flaw could compromise site integrity by creating unauthorized copies of restricted content.

    Recommendations

    Site administrators should immediately restrict access to the plugin for non-administrative users. Evaluate user roles and ensure that least privilege is enforced across the platform to minimize risk exposure. Additionally, monitor your WordPress site for any unauthorized post activities as a precaution.

    Available Fixes

    Last Updated: 12/13/2025
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2025 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More