Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 00:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 20 Jan 2026 23:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 19 Dec 2025 18:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codepeople
Codepeople contact Form Email Wordpress Wordpress wordpress |
|
| Vendors & Products |
Codepeople
Codepeople contact Form Email Wordpress Wordpress wordpress |
Fri, 19 Dec 2025 04:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 18 Dec 2025 16:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.60. | |
| Title | WordPress Contact Form Email plugin <= 1.3.60 - Insecure Direct Object References (IDOR) vulnerability | |
| Weaknesses | CWE-639 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-01-20T14:28:04.445Z
Reserved: 2025-09-05T10:51:06.149Z
Link: CVE-2025-10019
Updated: 2025-12-18T18:26:24.615Z
Status : Awaiting Analysis
Published: 2025-12-18T08:15:48.657
Modified: 2026-01-20T15:16:12.810
Link: CVE-2025-10019
No data.
OpenCVE Enrichment
Updated: 2025-12-19T18:18:39Z