Critical Flaws in WordPress Plugin Leave 10,000 Sites Vulnerable

July 28, 2025
Critical Flaws in WordPress Plugin Leave 10,000 Sites Vulnerable

More than 10,000 WordPress sites have been left vulnerable to full site takeover due to three critical security flaws discovered in the HT Contact Form Widget for Elementor Page Builder & Gutenberg Blocks & Form Builder plugin.

The vulnerabilities, which include Arbitrary File Upload, Arbitrary File Deletion and Arbitrary File Move, allowed unauthenticated attackers to execute malicious code, delete essential files or move them to new locations. 

According to a new advisory by Wordfence, all three issues made remote code execution and full site compromise possible.

Flaws Could Allow Complete Site Takeover

The most severe of the three, CVE-2025-7340, carried a CVSS score of 9.8. It allowed attackers to upload any file type (including executable PHP scripts) due to a lack of validation in the plugin's temp_file_upload() function. These files were stored in public directories, enabling direct access and execution.

The second flaw, CVE-2025-7341, allowed arbitrary file deletion via the temp_file_delete() function. Attackers could delete the wp-config.php file, placing the site into setup mode and enabling full control if pointed to a new database.

A third vulnerability, CVE-2025-7360, involved arbitrary file moving using the handle_files_upload() function. This function failed to sanitize file names properly, letting attackers move critical files and trigger the same kind of compromise as deletion.

Read more on WordPress plugin security risks: Vulnerability in Chaty Pro Plugin Exposes 18,000 WordPress Sites

Recommended Action for Site Owners

The issues were disclosed to Wordfence through its bug bounty program by researchers vgo0 and Phat RiO. Wordfence contacted plugin developer HasTech IT on July 8. A patch was released just five days later, on July 13.

"We encourage WordPress users to verify that their sites are updated to the latest patched version of HT Contact Form as soon as possible considering the critical nature of these vulnerabilities," Wordfence said.

To stay protected, the company also advised users to:

  • Keep plugins and themes updated

  • Apply vendor patches promptly

  • Use a security solution with file upload and directory traversal protections

"If you know someone who uses this plugin on their site, we recommend sharing this advisory with them to ensure their site remains secure, as these vulnerabilities pose a significant risk," Wordfence concluded.

Tags:

No tags.

JikGuard.com, a high-tech security service provider focusing on game protection and anti-cheat, is committed to helping game companies solve the problem of cheats and hacks, and providing deeply integrated encryption protection solutions for games.

Explore Features>>