Reflected Cross-Site Scripting in Contact Form 7 reCAPTCHA Plugin for WordPress
CVE-2025-8280

5.8MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
12 September 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2025-8280?

The Contact Form 7 reCAPTCHA plugin for WordPress, up to version 1.2.0, is susceptible to reflected cross-site scripting (XSS) attacks. This vulnerability arises because the plugin fails to properly escape the data from the $_SERVER['REQUEST_URI'] parameter before rendering it within an HTML attribute. Attackers could exploit this flaw, particularly in older web browsers, enabling them to inject malicious scripts into web pages viewed by users. As a result, unsuspecting users could potentially be tricked into executing harmful scripts, compromising their data and security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Contact Form 7 reCAPTCHA 0 <= 1.2.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Bob Matyas
WPScan
.