Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10732: CWE-862 Missing Authorization in brainstormforce SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more

0
Medium
VulnerabilityCVE-2025-10732cvecve-2025-10732cwe-862
Published: Tue Oct 14 2025 (10/14/2025, 05:24:58 UTC)
Source: CVE Database V5
Vendor/Project: brainstormforce
Product: SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more

Description

CVE-2025-10732 is a medium severity vulnerability in the SureForms WordPress plugin that allows authenticated users with contributor-level access or higher to access sensitive information via an improperly protected REST API endpoint. Exploitation enables disclosure of API keys for Google reCAPTCHA, Cloudflare Turnstile, hCaptcha, admin email addresses, and security-related form settings. The vulnerability arises from missing authorization checks on the '/wp-json/sureforms/v1/srfm-global-settings' endpoint. No user interaction beyond authentication is required, and the attack vector is network-based. Although no known exploits are currently in the wild, affected sites should prioritize patching or mitigating this issue to prevent potential information leakage. This vulnerability impacts all versions up to and including 1. 12. 1 of the plugin. European organizations using this plugin, especially those with contributor-level WordPress users, are at risk of sensitive data exposure that could facilitate further attacks or abuse of security controls.

AI-Powered Analysis

AILast updated: 10/21/2025, 12:00:04 UTC

Technical Analysis

CVE-2025-10732 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the SureForms – Drag and Drop Contact Form Builder WordPress plugin, versions up to 1.12.1. The flaw exists due to improper access control on the REST API endpoint '/wp-json/sureforms/v1/srfm-global-settings'. This endpoint exposes sensitive configuration data without verifying that the requesting user has sufficient privileges beyond contributor-level access. As a result, authenticated users with relatively low privileges can retrieve sensitive information including API keys for anti-bot services such as Google reCAPTCHA, Cloudflare Turnstile, and hCaptcha, as well as admin email addresses and other security-related form settings. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS v3.1 score is 4.3 (medium severity), reflecting the limited scope of impact (confidentiality only), the requirement for authenticated access, and the ease of exploitation due to lack of authorization checks. No known public exploits have been reported yet. The exposure of these API keys and admin emails can facilitate further attacks such as bypassing anti-bot protections, phishing, or targeted social engineering. The vulnerability affects all plugin versions up to 1.12.1, and no official patches have been linked yet, indicating the need for immediate mitigation steps by administrators.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive information disclosure that could undermine the security posture of websites using the SureForms plugin. Disclosure of API keys for anti-bot services can allow attackers to bypass CAPTCHA protections, increasing the risk of automated attacks such as spam, brute force login attempts, or account takeover. Exposure of admin email addresses can facilitate phishing campaigns or targeted social engineering attacks against key personnel. While the vulnerability does not directly allow code execution or data modification, the leakage of security-related settings and credentials can be leveraged as a stepping stone for more severe attacks. Organizations relying on WordPress sites with contributor-level users should be particularly cautious, as these users can exploit the flaw without elevated privileges. The impact is heightened for sectors with high regulatory requirements for data protection, such as finance, healthcare, and government entities in Europe, where unauthorized disclosure of security configurations may violate compliance mandates. Additionally, the widespread use of WordPress in Europe means a significant number of sites could be affected, potentially impacting brand reputation and customer trust if exploited.

Mitigation Recommendations

To mitigate CVE-2025-10732, European organizations should first verify if their WordPress installations use the SureForms plugin up to version 1.12.1. Immediate steps include restricting contributor-level user permissions to the minimum necessary and auditing user roles to remove unnecessary contributor access. Since no official patch is currently linked, administrators should consider disabling or uninstalling the SureForms plugin until a fixed version is released. Alternatively, web application firewalls (WAFs) can be configured to block or monitor requests to the vulnerable REST API endpoint '/wp-json/sureforms/v1/srfm-global-settings' from users without appropriate privileges. Monitoring logs for unusual access patterns to this endpoint can help detect exploitation attempts. Additionally, organizations should rotate any exposed API keys for Google reCAPTCHA, Cloudflare Turnstile, and hCaptcha as a precautionary measure. Implementing strict role-based access control (RBAC) policies and regularly reviewing plugin security advisories will further reduce risk. Finally, educating site administrators and contributors about the risks of privilege misuse and the importance of timely updates is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-19T14:28:48.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ede1c61a06eb79bea0b465

Added to database: 10/14/2025, 5:38:14 AM

Last enriched: 10/21/2025, 12:00:04 PM

Last updated: 12/3/2025, 11:51:03 PM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats