Search

published date: July 15, 2025

CVE-2025-7360 : Code Execution Vulnerability

Description

The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation in the handle_files_upload() function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php).

Product(s):

  • HasThemes Download Contact Form 7 Widget for Elementor Page Builder & Gutenberg Blocks for WordPress
  • HasThemes Download Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks for WordPress
  • HasThemes Download Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks 1.0.3 for WordPress
  • HasThemes Download Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks 1.0.4 for WordPress
  • HasThemes Download Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks 1.0.5 for WordPress
  • HasThemes Download Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks 1.0.6 for WordPress

Question to Ask Vendors:

  1. Can you confirm whether your systems are affected by CVE-2025-7360, and if so, what steps are you currently taking to mitigate this vulnerability?
  2. What is your estimated timeline for fully resolving CVE-2025-7360 in your products or services, and how will you communicate updates on this issue to us as your customer?

READY TO GET RESULTS YOU CAN TRUST?