Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10694: CWE-862 Missing Authorization in smub User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds

0
Medium
VulnerabilityCVE-2025-10694cvecve-2025-10694cwe-862
Published: Sat Oct 25 2025 (10/25/2025, 05:31:22 UTC)
Source: CVE Database V5
Vendor/Project: smub
Product: User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds

Description

The User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `maybe_load_onboarding_wizard` function in all versions up to, and including, 1.8.0. This makes it possible for unauthenticated attackers to access the onboarding wizard page and view configuration information including the administrator email address.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:34:39 UTC

Technical Analysis

The vulnerability identified as CVE-2025-10694 affects the WordPress plugin 'User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds' developed by smub. The root cause is a missing capability check in the 'maybe_load_onboarding_wizard' function, which is responsible for loading the onboarding wizard page. Because this function lacks proper authorization controls, unauthenticated attackers can remotely access this page. This unauthorized access allows attackers to view sensitive configuration information, notably the administrator's email address, which is typically protected. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to enforce proper access control. The issue affects all plugin versions up to and including 1.8.0. The CVSS 3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and limited confidentiality impact. Although the vulnerability does not allow modification or disruption of the system, the exposure of admin email addresses can aid attackers in crafting targeted attacks such as phishing or spear-phishing campaigns. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date (October 25, 2025).

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive configuration information, specifically the administrator's email address. This information leakage can facilitate further attacks, including targeted phishing, social engineering, or reconnaissance activities by malicious actors. While the vulnerability does not directly compromise system integrity or availability, the exposure of admin contact details can lead to indirect compromises if attackers use this information to gain trust or deliver malicious payloads. Organizations relying on this plugin may face increased risk of social engineering attacks against their administrators, potentially leading to credential theft or unauthorized access through secondary attack vectors. The vulnerability's ease of exploitation (no authentication or user interaction required) increases its risk profile, especially for websites with high visibility or critical administrative roles. However, the lack of direct code execution or data modification limits the immediate technical damage. The absence of known exploits in the wild reduces immediate urgency but does not eliminate future risk.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if they are using the affected plugin versions (up to and including 1.8.0). Since no official patch links are currently available, administrators should consider the following specific actions: 1) Temporarily disable or uninstall the vulnerable plugin until a patch is released. 2) Implement web application firewall (WAF) rules to restrict access to the onboarding wizard URL or related endpoints, allowing only trusted IP addresses or authenticated users. 3) Employ security plugins or custom code to enforce capability checks on the 'maybe_load_onboarding_wizard' function or its URL path, ensuring only authorized users can access it. 4) Monitor web server logs for unusual access attempts to the onboarding wizard page to detect potential exploitation attempts. 5) Educate administrators about phishing risks, especially since their email addresses may be exposed, and encourage the use of multi-factor authentication (MFA) to reduce the impact of credential compromise. 6) Stay alert for official patches or updates from the plugin vendor and apply them promptly once available. 7) Consider isolating or sandboxing the WordPress environment to limit exposure of sensitive configuration data.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-18T15:41:28.436Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fc626907185a1a52fd75f3

Added to database: 10/25/2025, 5:38:49 AM

Last enriched: 2/27/2026, 6:34:39 PM

Last updated: 3/24/2026, 11:14:46 PM

Views: 173

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses