Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10489: CWE-862 Missing Authorization in brainstormforce SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more

0
Medium
VulnerabilityCVE-2025-10489cvecve-2025-10489cwe-862
Published: Sat Sep 20 2025 (09/20/2025, 04:27:55 UTC)
Source: CVE Database V5
Vendor/Project: brainstormforce
Product: SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more

Description

The SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more plugin for WordPress is vulnerable to unauthorized creation of forms due to a missing capability check on the register_post_types() function in all versions up to, and including, 1.12.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to create forms when the user interface specifically prohibits it.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:26:48 UTC

Technical Analysis

CVE-2025-10489 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the SureForms – Drag and Drop Contact Form Builder plugin for WordPress. The flaw arises because the plugin fails to enforce proper capability checks when registering custom post types via the register_post_types() function. This omission allows authenticated users with Contributor-level privileges or higher to create new forms even though the user interface explicitly prohibits such actions for these roles. The vulnerability affects all versions up to and including 1.12.0 of the plugin. The attack vector is network-based (remote), requiring low complexity and no user interaction, but does require authenticated access with at least Contributor privileges. The CVSS v3.1 base score is 4.3 (medium severity), reflecting limited impact on confidentiality and availability but a partial impact on integrity due to unauthorized form creation. This could be leveraged by attackers to insert malicious or spam forms, potentially leading to phishing or social engineering attacks, or to disrupt site content management. No patches or exploit code are currently publicly available, and no active exploitation has been reported. The vulnerability highlights a common security oversight in WordPress plugins where capability checks are not consistently enforced at the backend, allowing privilege escalation within the scope of authenticated users.

Potential Impact

The primary impact of this vulnerability is on the integrity of the affected WordPress sites. Unauthorized form creation can allow attackers with Contributor-level access to insert malicious forms that could be used for phishing, data collection, or to facilitate further attacks such as cross-site scripting or social engineering. Although confidentiality and availability are not directly affected, the presence of unauthorized forms can damage the reputation of organizations, lead to user trust erosion, and potentially expose end users to fraud or malware. For organizations relying on SureForms for critical customer interactions or data collection, this could disrupt business processes or lead to compliance issues if malicious forms collect sensitive data. Since Contributor-level access is required, the threat is limited to insiders or compromised accounts, but this is a common privilege level for many WordPress sites allowing user-generated content. The lack of user interaction requirement and low attack complexity increase the risk of exploitation once an attacker gains such access.

Mitigation Recommendations

1. Update the SureForms plugin to a version that includes proper authorization checks once a patch is released by the vendor. 2. Until a patch is available, restrict Contributor-level and higher roles from accessing form creation features by customizing role capabilities or using a role management plugin to remove 'edit_forms' or equivalent capabilities. 3. Implement strict monitoring and auditing of form creation activities in WordPress admin to detect unauthorized form additions promptly. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious form creation requests originating from authenticated users with Contributor roles. 5. Educate site administrators to review user roles and permissions regularly and limit Contributor access to trusted users only. 6. Consider disabling or removing the SureForms plugin if it is not essential to reduce attack surface. 7. Conduct regular security assessments and penetration testing focused on authorization controls within WordPress plugins.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-15T15:14:26.747Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cf42444a0b186b9321b044

Added to database: 9/21/2025, 12:09:40 AM

Last enriched: 2/27/2026, 6:26:48 PM

Last updated: 3/25/2026, 5:58:08 PM

Views: 151

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses