Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10694: CWE-862 Missing Authorization in smub User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds

0
Medium
VulnerabilityCVE-2025-10694cvecve-2025-10694cwe-862
Published: Sat Oct 25 2025 (10/25/2025, 05:31:22 UTC)
Source: CVE Database V5
Vendor/Project: smub
Product: User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds

Description

The User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `maybe_load_onboarding_wizard` function in all versions up to, and including, 1.8.0. This makes it possible for unauthenticated attackers to access the onboarding wizard page and view configuration information including the administrator email address.

AI-Powered Analysis

AILast updated: 11/01/2025, 07:15:42 UTC

Technical Analysis

The vulnerability identified as CVE-2025-10694 affects the WordPress plugin 'User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds' developed by smub. The root cause is a missing authorization check (CWE-862) in the function 'maybe_load_onboarding_wizard', which is responsible for loading the onboarding wizard page. Because this function does not verify user capabilities, unauthenticated attackers can access this page directly. This unauthorized access allows attackers to view sensitive configuration information, including the administrator's email address, which is typically protected. The vulnerability affects all plugin versions up to and including 1.8.0. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality only (C:L), without affecting integrity or availability. Although no known exploits have been reported in the wild, the exposure of admin email addresses can facilitate targeted phishing campaigns or further reconnaissance. The lack of a patch at the time of publication means that users must rely on mitigating controls or plugin updates once available. This vulnerability highlights the importance of proper authorization checks in web applications, especially plugins that handle administrative functions.

Potential Impact

For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of administrator email addresses and potentially other configuration details. This information leakage can enable attackers to craft targeted phishing or spear-phishing attacks, increasing the risk of credential compromise or social engineering. While the vulnerability does not directly allow system compromise or data manipulation, it lowers the barrier for subsequent attacks. Organizations running WordPress sites with this plugin are at risk of reputational damage if attackers leverage the disclosed information for malicious campaigns. Additionally, organizations in regulated sectors (e.g., finance, healthcare) may face compliance issues if personal data is exposed or if phishing leads to data breaches. The vulnerability's ease of exploitation (no authentication or user interaction required) increases the likelihood of scanning and exploitation attempts. European entities with a strong online presence or customer-facing WordPress sites are particularly vulnerable to indirect impacts stemming from this information disclosure.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement the following mitigations: 1) Immediately audit WordPress sites to identify installations of the affected plugin and restrict access to the onboarding wizard page via web server configuration (e.g., IP whitelisting or HTTP authentication). 2) Disable or uninstall the vulnerable plugin if it is not essential to reduce the attack surface. 3) Monitor web server logs for unusual access patterns targeting the onboarding wizard URL to detect potential exploitation attempts. 4) Implement email filtering and user awareness training to mitigate risks from phishing attacks leveraging disclosed administrator emails. 5) Once a patch or updated plugin version is released, prioritize prompt updates. 6) Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized access to the vulnerable endpoint. 7) Review and harden WordPress user roles and permissions to minimize exposure of sensitive administrative functions. These steps go beyond generic advice by focusing on immediate containment and detection until a patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-18T15:41:28.436Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fc626907185a1a52fd75f3

Added to database: 10/25/2025, 5:38:49 AM

Last enriched: 11/1/2025, 7:15:42 AM

Last updated: 12/3/2025, 1:28:19 PM

Views: 147

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats