Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10732: CWE-862 Missing Authorization in brainstormforce SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more

0
Medium
VulnerabilityCVE-2025-10732cvecve-2025-10732cwe-862
Published: Tue Oct 14 2025 (10/14/2025, 05:24:58 UTC)
Source: CVE Database V5
Vendor/Project: brainstormforce
Product: SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more

Description

The SureForms – Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 1.12.1. This is due to improper access control implementation on the '/wp-json/sureforms/v1/srfm-global-settings' REST API endpoint. This makes it possible for authenticated attackers, with contributor-level access and above, to retrieve sensitive information including API keys for Google reCAPTCHA, Cloudflare Turnstile, hCaptcha, admin email addresses, and security-related form settings.

AI-Powered Analysis

AILast updated: 10/14/2025, 05:51:24 UTC

Technical Analysis

CVE-2025-10732 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the SureForms – Drag and Drop Contact Form Builder plugin for WordPress, versions up to and including 1.12.1. The issue stems from improper access control on the REST API endpoint '/wp-json/sureforms/v1/srfm-global-settings', which does not adequately verify the authorization level of the requesting user. As a result, any authenticated user with contributor-level privileges or higher can access this endpoint and retrieve sensitive configuration data. This data includes API keys for third-party services such as Google reCAPTCHA, Cloudflare Turnstile, and hCaptcha, which are critical for bot mitigation and security. Additionally, attackers can obtain admin email addresses and other security-related form settings. The vulnerability does not require user interaction beyond authentication and does not allow modification or disruption of services, limiting its impact to confidentiality breaches. The CVSS v3.1 score is 4.3 (medium), reflecting the ease of exploitation given contributor access but limited impact scope. No patches or known exploits are currently available, highlighting the need for proactive mitigation. The plugin's widespread use in WordPress sites makes this a relevant concern for organizations relying on it for form management and security.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential exposure of sensitive API keys and administrative contact information. Disclosure of API keys for reCAPTCHA and similar services can enable attackers to bypass anti-bot protections, facilitating automated attacks such as spam, credential stuffing, or brute force attempts. Exposure of admin email addresses increases the risk of targeted phishing or social engineering campaigns. While the vulnerability does not allow direct modification or denial of service, the compromised data can be leveraged to escalate attacks or gain further access. Organizations handling sensitive user data or relying heavily on WordPress-based web infrastructure are particularly at risk. The breach of confidentiality could lead to reputational damage, regulatory scrutiny under GDPR for inadequate data protection, and potential financial losses from subsequent attacks. The requirement for contributor-level access means that insider threats or compromised accounts pose a significant risk vector. Given the popularity of WordPress and the plugin in Europe, the threat is non-trivial and warrants immediate attention.

Mitigation Recommendations

To mitigate CVE-2025-10732, organizations should first verify and restrict user roles to the minimum necessary privileges, especially limiting contributor-level access to trusted users only. Implement strict access controls and monitor user activity for suspicious behavior. Since no official patch is currently available, consider temporarily disabling the SureForms plugin or replacing it with alternative form builders that enforce proper authorization. Review and rotate all exposed API keys for Google reCAPTCHA, Cloudflare Turnstile, and hCaptcha to prevent misuse. Employ Web Application Firewalls (WAFs) to monitor and block unauthorized API requests targeting the vulnerable endpoint. Additionally, audit WordPress REST API usage and restrict access to sensitive endpoints via custom rules or plugins that enforce authorization checks. Maintain up-to-date backups and monitor logs for signs of exploitation attempts. Educate administrators and contributors about the risks of privilege misuse and enforce strong authentication mechanisms such as MFA to reduce the risk of account compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-19T14:28:48.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ede1c61a06eb79bea0b465

Added to database: 10/14/2025, 5:38:14 AM

Last enriched: 10/14/2025, 5:51:24 AM

Last updated: 10/14/2025, 7:19:40 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats