Cyber Posture

CVE-2025-14457

Low

Published: 15 January 2026

Published
15 January 2026
Modified
23 January 2026
KEV Added
Patch
CVSS Score 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS Score 0.0008 24.2th percentile
Risk Priority 7 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-14457 is a low-severity Missing Authorization (CWE-862) vulnerability in Codedropz Contact Form 7. Its CVSS base score is 3.7 (Low).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-862

Requiring an access control policy ensures authorization checks are defined and applied for critical functions.

addresses: CWE-862

Reviews of access controls detect missing authorization checks on critical functions or resources.

addresses: CWE-862

Documenting permitted unauthenticated actions prevents missing authorization by making all exceptions explicit and subject to organizational review.

addresses: CWE-862

Requiring attribute association with information prevents authorization from being performed without necessary security or privacy context.

addresses: CWE-862

Mandating authorization prior to allowing remote connections addresses missing authorization for remote access.

addresses: CWE-862

Mandating authorization before wireless connections are allowed prevents missing authorization for wireless access.

addresses: CWE-862

The control requires authorization before allowing mobile device connections, directly mitigating missing authorization for system access.

addresses: CWE-862

Requiring approvals for account creation and specifying authorizations ensures authorization is not missing for system access.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

Missing authorization in public-facing WordPress plugin enables unauthenticated network exploitation for arbitrary file deletion.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing ownership check in the dnd_codedropz_upload_delete() function in all versions up to, and including, 1.3.9.2. This…

more

makes it possible for unauthenticated attackers to delete arbitrary uploaded files when the "Send attachments as links" setting is enabled.

Deeper analysisAI

CVE-2025-14457 is a vulnerability in the Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress, affecting all versions up to and including 1.3.9.2. It stems from a missing ownership check in the dnd_codedropz_upload_delete() function, leading to unauthorized modification of data and classified under CWE-862 (Missing Authorization). The issue enables unauthenticated attackers to delete arbitrary uploaded files specifically when the "Send attachments as links" setting is enabled. The CVSS v3.1 base score is 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N), reflecting low severity with network accessibility but high attack complexity and limited integrity impact.

Unauthenticated attackers can exploit this over the network without user interaction or privileges required. By invoking the vulnerable function without proper ownership validation, they can target and delete any uploaded files accessible via the plugin when the specified setting is active, potentially disrupting file-dependent workflows on affected WordPress sites.

Mitigation details are outlined in the WordPress plugin trac changeset 3428236 and Wordfence threat intelligence advisory at https://www.wordfence.com/threat-intel/vulnerabilities/id/1a182243-b24a-4c46-8b65-6b38d8509a51?source=cve, which cover the patch implementation and additional remediation guidance.

Details

CWE(s)

Affected Products

codedropz
contact form 7
≤ 1.3.9.2

CVEs Like This One

CVE-2025-2328Same product class: WordPress / CMS plugin
CVE-2025-2485Same product class: WordPress / CMS plugin
CVE-2024-12267Same product class: WordPress / CMS plugin
CVE-2025-24618Same product class: WordPress / CMS plugin
CVE-2025-24596Same product class: WordPress / CMS plugin
CVE-2024-10591Same product class: WordPress / CMS plugin
CVE-2024-12129Same product class: WordPress / CMS plugin
CVE-2025-7341Same product class: WordPress / CMS plugin
CVE-2024-13921Same product class: WordPress / CMS plugin
CVE-2025-1441Same product class: WordPress / CMS plugin

References