About our most secure, flexible plan purpose-built for large teams and organizations
Get Started NowAre you a WordPress site owner? Do you rely on a contact form to connect with users, generate potential leads, or obtain feedback? If so, you need to pay close attention. A major security flaw has been discovered in a widely used WordPress plugin, putting over 300,000 websites in immediate danger. This isn’t just a minor bug, it’s a high-severity vulnerability that could allow hackers to take complete control of your site.
This critical issue affects the Redirection for Contact Form 7 plugin, a popular add-on that extends the functionality of the well-known Contact Form 7 plugin. With a high severity rating of 8.8/10 on the CVSS scale, this vulnerability is a serious threat that requires your immediate attention.
First, let’s understand why this vulnerability is so impactful. The Redirection for Contact Form 7 plugin is a favorite among site administrators because it adds powerful features to the standard contact form. This plugin gives you the option to do more than simply display a “thank you” message, including:
Because it offers such valuable functionality, it’s used by a huge number of websites – from small businesses and blogs to large e-commerce sites. Its widespread use highlights the importance of regular WordPress maintenance, as even popular plugins can introduce significant security risks. The plugin’s popularity is precisely what makes this security flaw so dangerous, as it affects a massive installed base.
To learn more about what a good plan includes, check out our guide on Choosing the Right WordPress Maintenance Plan in 2025 and Why It’s Critical.
The vulnerability stems from a basic but critical oversight within the plugin’s code. Specifically, the flaw exists in a function called delete_associated_files. As its name suggests, this function is designed to delete files that are no longer needed, such as temporary files created during form submissions.
However, the function suffers from “insufficient file path validation.” In simple terms, it doesn’t properly check what kind of input it receives. It trusts whatever information it’s given, which is a major security no-no. An attacker can exploit this weakness by manipulating the function to delete any file they want on your server, not just the temporary ones it’s supposed to handle.
This simple flaw opens the door to a devastating attack. An attacker can trick the function into deleting a critical file that is essential for your website’s operation. The most dangerous target? Your wp-config.php file.
So, why is deleting your wp-config.php file such a disaster?
All the key settings that keep your WordPress site running are saved inside the wp-config.php file. It contains your database credentials, security keys, and other vital configuration settings. Deleting this file is like taking the keys and the blueprints to your house and throwing them away. Your site will immediately stop working, and without the proper configuration, a hacker can easily launch a Remote Code Execution (RCE) attack.
A Remote Code Execution (RCE) attack is considered highly dangerous because it lets hackers run harmful code on your web server from afar. Once someone reaches this access level, they can perform actions such as:
In essence, deleting the wp-config.php file creates a clear path for a hacker to gain full, unauthorized control of your site, turning a simple file deletion flaw into a full-blown site takeover.
The good news is that a fix is available, but you must act quickly. Users should note that the vulnerability exists across every plugin version up to and including 3.2.4, without exception.
Here’s what you need to do right now:
This high-severity vulnerability in the Redirection for Contact Form 7 plugin is a stark reminder of the constant security challenges in the digital world. What might seem like a simple function flaw can lead to a catastrophic security breach.
Your website is a valuable asset, and protecting it is an ongoing responsibility. By staying informed about security threats and following best practices for updates and backups, you can significantly reduce your risk and keep your site, and your visitors, safe. For more expert insights and actionable advice on keeping your WordPress site secure and optimized, trust WPcaps as your go-to resource.