WordPress HT Contact Form 7 Plugin <= 2.0.0 is vulnerable to Local File Inclusion

Low priority Mitigation unnecessary
<= 2.0.0Vulnerable version(s)
2.1.0Fixed version

Get the fastest vulnerability mitigation with Patchstack!

Get started

Risks

CVSS 6.6

6.6

Local File Inclusion

This could allow a malicious actor to include local files of the target website and show its output onto the screen. Files which store credentials, such as database credentials, could potentially allow complete database takeover depending on the configuration.

CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.

Solutions

This security issue has a low severity impact and is unlikely to be exploited.

Update to version 2.1.0 or later.

Update to version 2.1.0 or later to remove the vulnerability. Patchstack users can turn on auto-update for vulnerable plugins only.

Details

Have additional information or questions about this entry? Let us know.

Timeline

16 Jul, 2025

Early warning sent out to Patchstack customers

16 Jul, 2025

Published by Patchstack

16 Jul, 2025

Weekly WordPress security intelligence delivered to your inbox.