The StickEasy Protected Contact Form plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 1.0.2. The plugin stores spam detection logs at a predictable publicly accessible location (wp-content/uploads/stickeasy-protected-contact-form/spcf-log.txt). This makes it possible for unauthenticated attackers to download the log file and access sensitive information including visitor IP addresses, email addresses, and comment snippets from contact form submissions that were flagged as spam.
History

Tue, 17 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Kasuga16
Kasuga16 stickeasy Protected Contact Form
Wordpress
Wordpress wordpress
Vendors & Products Kasuga16
Kasuga16 stickeasy Protected Contact Form
Wordpress
Wordpress wordpress

Sat, 14 Feb 2026 04:00:00 +0000

Type Values Removed Values Added
Description The StickEasy Protected Contact Form plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 1.0.2. The plugin stores spam detection logs at a predictable publicly accessible location (wp-content/uploads/stickeasy-protected-contact-form/spcf-log.txt). This makes it possible for unauthenticated attackers to download the log file and access sensitive information including visitor IP addresses, email addresses, and comment snippets from contact form submissions that were flagged as spam.
Title StickEasy Protected Contact Form <= 1.0.1 - Unauthenticated Information Disclosure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2026-02-14T03:25:27.497Z

Updated: 2026-02-17T15:06:04.122Z

Reserved: 2025-12-03T16:01:21.540Z

Link: CVE-2025-13973

cve-icon Vulnrichment

Updated: 2026-02-17T15:05:58.234Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-14T04:15:56.313

Modified: 2026-02-18T17:52:44.520

Link: CVE-2025-13973

cve-icon Redhat

No data.