Search

published date: July 15, 2025

CVE-2025-7340 : Code Execution Vulnerability

Description

The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the temp_file_upload function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Product(s):

  • HasThemes Download Contact Form 7 Widget for Elementor Page Builder & Gutenberg Blocks for WordPress
  • HasThemes Download Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks for WordPress
  • HasThemes Download Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks 1.0.3 for WordPress
  • HasThemes Download Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks 1.0.4 for WordPress
  • HasThemes Download Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks 1.0.5 for WordPress
  • HasThemes Download Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks 1.0.6 for WordPress

Question to Ask Vendors:

  1. Can you confirm whether your systems are affected by CVE-2025-7340, and if so, what steps are you currently taking to mitigate this vulnerability?
  2. What is your estimated timeline for fully resolving CVE-2025-7340 in your products or services, and how will you communicate updates on this issue to us as your customer?

READY TO GET RESULTS YOU CAN TRUST?