[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f81RzvyPAvT2td8x5Nw3dRtpdDnFC_EF72paeos7J3ww":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-10019","contact-form-email-unauthenticated-insecure-direct-object-reference","Contact Form Email \u003C= 1.3.60 - Unauthenticated Insecure Direct Object Reference","The Contact Form Email plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.60 due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to perform an unauthorized action.","contact-form-to-email",null,"\u003C=1.3.60","1.3.61","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Authorization Bypass Through User-Controlled Key","2025-12-01 00:00:00","2026-01-07 14:26:34",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F7399f8f3-70ee-44ed-b8c8-211ae22aa86b?source=api-prod",38]