Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11924: CWE-639 Authorization Bypass Through User-Controlled Key in kstover Ninja Forms – The Contact Form Builder That Grows With You

0
High
VulnerabilityCVE-2025-11924cvecve-2025-11924cwe-639
Published: Wed Dec 17 2025 (12/17/2025, 06:42:30 UTC)
Source: CVE Database V5
Vendor/Project: kstover
Product: Ninja Forms – The Contact Form Builder That Grows With You

Description

The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.13.2. This is due to the plugin not properly verifying that a user is authorized before the `ninja-forms-views` REST endpoints return form metadata and submission content. This makes it possible for unauthenticated attackers to read arbitrary form definitions and submission records via a leaked bearer token granted they can load any page containing the Submissions Table block. NOTE: The developer released a patch for this issue in 3.13.1, but inadvertently introduced a REST API endpoint in which a valid bearer token could be minted for arbitrary form IDs, making this patch ineffective.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 19:41:40 UTC

Technical Analysis

CVE-2025-11924 is an authorization bypass vulnerability categorized under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Ninja Forms plugin for WordPress, a widely used contact form builder. The vulnerability exists in all versions up to and including 3.13.2. The root cause is the plugin's failure to properly verify that a user is authorized before the `ninja-forms-views` REST API endpoints return form metadata and submission content. This allows unauthenticated attackers to access arbitrary form definitions and submission records if they possess a leaked bearer token and can load any page containing the Submissions Table block. The initial patch released in version 3.13.1 attempted to fix the issue but inadvertently introduced a new REST API endpoint that enables attackers to mint valid bearer tokens for arbitrary form IDs, effectively bypassing the intended authorization controls. The vulnerability can be exploited remotely without any user interaction or privileges, making it highly accessible to attackers. The impact is primarily on confidentiality, as attackers can read sensitive form submission data, which may include personal or confidential information submitted by users. The vulnerability does not affect data integrity or availability. The CVSS v3.1 base score is 7.5, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and high confidentiality impact. No known exploits have been reported in the wild yet, but the vulnerability poses a significant risk given the popularity of Ninja Forms and WordPress. The lack of an effective patch at present increases the urgency for mitigation.

Potential Impact

The vulnerability allows attackers to bypass authorization controls and access sensitive form metadata and submission data without authentication. This can lead to exposure of personally identifiable information (PII), confidential business data, or other sensitive user inputs collected via Ninja Forms. Organizations using this plugin risk data breaches that could result in regulatory penalties, loss of customer trust, and reputational damage. Since the exploit requires no privileges or user interaction, it can be automated and scaled to target multiple sites. Attackers could also leverage leaked bearer tokens from other sources to expand their access. Although integrity and availability are not directly impacted, the confidentiality breach alone is critical, especially for organizations handling sensitive or regulated data. The ineffective patch increases the window of exposure, making timely mitigation essential. This vulnerability could be exploited by cybercriminals, espionage actors, or hacktivists targeting organizations with public-facing WordPress sites using Ninja Forms.

Mitigation Recommendations

1. Immediately upgrade Ninja Forms to a version that fully addresses CVE-2025-11924 once a reliable patch is released by the vendor. 2. Until a secure patch is available, consider disabling or removing the Ninja Forms plugin to eliminate exposure. 3. Restrict access to REST API endpoints related to Ninja Forms using web application firewall (WAF) rules or server-level access controls to block unauthorized requests. 4. Monitor web server and application logs for suspicious access patterns to the `ninja-forms-views` endpoints or unusual bearer token usage. 5. Rotate any leaked bearer tokens and invalidate existing tokens if possible. 6. Implement strict least privilege policies for WordPress users and audit plugin usage regularly. 7. Employ network segmentation and intrusion detection systems to detect and prevent exploitation attempts. 8. Educate site administrators about the risks and signs of exploitation. 9. Review and sanitize form data handling to minimize sensitive data exposure. 10. Maintain regular backups and incident response plans in case of data compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-17T18:54:25.934Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694254ebbd21432f8e5297b8

Added to database: 12/17/2025, 6:59:55 AM

Last enriched: 2/27/2026, 7:41:40 PM

Last updated: 3/24/2026, 12:15:52 AM

Views: 166

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses