🔐 CVE Alert

CVE-2019-25145

HIGH 7.2

Contact Form & SMTP Plugin by PirateForms <= 2.5.1 - Unauthenticated HTML injection

CVSS Score
7.2
EPSS Score
0.0%
EPSS Percentile
0th

The Contact Form & SMTP Plugin by PirateForms plugin for WordPress is vulnerable to HTML injection in the ‘public/class-pirateforms-public.php’ file in versions up to, and including, 2.5.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary HTML in emails that could be used to phish unsuspecting victims.

CWE CWE-79
Vendor smub
Product contact form & smtp plugin for wordpress by pirateforms
Published Jun 7, 2023
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for smub contact form & smtp plugin for wordpress by pirateforms

Be the first to know when new high vulnerabilities affecting smub contact form & smtp plugin for wordpress by pirateforms are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

smub / Contact Form & SMTP Plugin for WordPress by PirateForms
0 < 2.5.2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/9e34c3f6-cc84-4e45-9948-6f7fd5cba8cd?source=cve blog.nintechnet.com: https://blog.nintechnet.com/html-injection-vulnerability-in-wordpress-pirate-forms-plugin/

Credits

Jerome Bruandet