Plugin Vulnerability Hub
Plugin 8 known issues Latest disclosed Sep 09, 2025

Maspik – Ultimate Spam Protection Vulnerabilities

Review known vulnerability records for the WordPress plugin Maspik – Ultimate Spam Protection (`contact-forms-anti-spam`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2025-9979, CVE-2025-9888 and CVE-2024-53806, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
8
High or Critical
0
Patch Coverage
100%
Last Updated
Oct 28, 2025
Priority CVE Quick Links

Fast paths into Maspik – Ultimate Spam Protection CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
8
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for Maspik – Ultimate Spam Protection so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
8 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
0 critical and 0 high severity findings.
Recent CVEs
CVE-2025-9979, CVE-2025-9888 and CVE-2024-53806
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for Maspik – Ultimate Spam Protection

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: Yes CVE-2025-9979
CVE-2025-9979: Maspik <= 2.5.6 - Authenticated (Subscriber+) Missing Authorization to Spam Log Export

The Maspik plugin for WordPress is vulnerable to Missing Authorization in version 2.5.6 and prior. This is due to missing capability checks on the Maspik_spamlog_download_csv function. This makes it possible for authenticated attackers, with subscriber-level access and above, to...

Published
Sep 09, 2025
Patched Release
2.5.7
Affected Versions
Versions up to 2.5.6
Next Step
Update to 2.5.7 or newer if supported.
Plugin Medium Patched: Yes CVE-2025-9888
CVE-2025-9888: Maspik <= 2.5.6 - Cross-Site Request Forgery

The Maspik – Ultimate Spam Protection plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.6. This is due to missing or incorrect nonce validation on the clear_log function. This makes it possible for unauthenticated attackers...

Published
Sep 09, 2025
Patched Release
2.5.7
Affected Versions
Versions up to 2.5.6
Next Step
Update to 2.5.7 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-53806
CVE-2024-53806: Maspik – Spam blacklist <= 2.2.7 - Cross-Site Request Forgery to Plugin Settings Change

The Maspik – Advanced Spam Protection plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.7. This is due to missing or incorrect nonce validation on one of its functions. This makes it possible for unauthenticated attackers t...

Published
Dec 02, 2024
Patched Release
2.2.8
Affected Versions
Versions up to 2.2.7
Next Step
Update to 2.2.8 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-9182
CVE-2024-9182: Maspik – Spam blacklist <= 2.1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting

The Maspik – Spam Blacklist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with admini...

Published
Oct 02, 2024
Patched Release
2.1.3
Affected Versions
Versions up to 2.1.2
Next Step
Update to 2.1.3 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-25101
CVE-2024-25101: Maspik – Spam blacklist <= 0.10.6 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings

The Maspik – Spam Blacklist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 0.10.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with admin...

Published
Feb 12, 2024
Patched Release
0.10.7
Affected Versions
Versions up to 0.10.6
Next Step
Update to 0.10.7 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-48272
CVE-2023-48272: Maspik – Spam blacklist <= 0.9.2 - Unauthenticated Stored Cross-Site Scripting via efas_add_to_log

The Maspik – Spam Blacklist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the efas_add_to_log function in all versions up to, and including, 0.9.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attack...

Published
Nov 21, 2023
Patched Release
0.9.3
Affected Versions
Versions up to 0.9.2
Next Step
Update to 0.9.3 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-48271
CVE-2023-48271: Maspik – Spam blacklist <= 0.10.3 - Bypass

The Maspik – Spam Blacklist plugin for WordPress is vulnerable to IP Filtering Bypass in all versions up to, and including, 0.10.3 due to insufficient IP address validation. This makes it possible for unauthenticated attackers to bypass IP-based restrictions.

Published
Nov 21, 2023
Patched Release
0.10.4
Affected Versions
Versions up to 0.10.3
Next Step
Update to 0.10.4 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-24008
CVE-2023-24008: Maspik – Spam blacklist <= 0.7.8 - Cross-Site Request Forgery

The Maspik plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.7.8. This is due to missing or incorrect nonce validation in the file /admin/partials/contact-forms-anti-spam-log.php. This makes it possible for unauthenticated attack...

Published
Feb 27, 2023
Patched Release
0.7.9
Affected Versions
Versions up to 0.7.8
Next Step
Update to 0.7.9 or newer if supported.