Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11924: CWE-639 Authorization Bypass Through User-Controlled Key in kstover Ninja Forms – The Contact Form Builder That Grows With You

0
High
VulnerabilityCVE-2025-11924cvecve-2025-11924cwe-639
Published: Wed Dec 17 2025 (12/17/2025, 06:42:30 UTC)
Source: CVE Database V5
Vendor/Project: kstover
Product: Ninja Forms – The Contact Form Builder That Grows With You

Description

The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.13.2. This is due to the plugin not properly verifying that a user is authorized before the `ninja-forms-views` REST endpoints return form metadata and submission content. This makes it possible for unauthenticated attackers to read arbitrary form definitions and submission records via a leaked bearer token granted they can load any page containing the Submissions Table block. NOTE: The developer released a patch for this issue in 3.13.1, but inadvertently introduced a REST API endpoint in which a valid bearer token could be minted for arbitrary form IDs, making this patch ineffective.

AI-Powered Analysis

AILast updated: 12/24/2025, 08:18:21 UTC

Technical Analysis

CVE-2025-11924 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Ninja Forms WordPress plugin, a widely used contact form builder. The vulnerability exists because the plugin's 'ninja-forms-views' REST API endpoints do not properly verify user authorization before returning form metadata and submission content. This flaw allows unauthenticated attackers who possess a leaked bearer token to retrieve arbitrary form definitions and submission records. The issue is compounded by a flawed patch released in version 3.13.1, which inadvertently introduced a REST API endpoint enabling attackers to mint valid bearer tokens for any form ID, effectively bypassing the intended fix. The vulnerability affects all versions up to and including 3.13.2. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector, no privileges required, no user interaction, and high confidentiality impact. The vulnerability does not affect integrity or availability but poses a significant risk of sensitive data exposure. No known exploits have been reported in the wild yet, but the ease of exploitation and the potential for data leakage make this a critical concern for organizations relying on Ninja Forms for data collection.

Potential Impact

For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of sensitive personal data collected via Ninja Forms, including contact details, personal identifiers, and potentially sensitive submission content. This can lead to violations of GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Organizations in sectors such as healthcare, finance, education, and government, which often use WordPress-based websites with contact forms, are particularly vulnerable. The exposure of confidential form submissions can facilitate further attacks such as phishing, social engineering, or identity theft. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad. The ineffective patch increases the risk window, as organizations may believe they are protected when they are not. The lack of known exploits currently provides a limited window for proactive mitigation before potential exploitation.

Mitigation Recommendations

1. Immediately verify the version of Ninja Forms in use and avoid versions up to and including 3.13.2. 2. Monitor official Ninja Forms and WordPress security advisories for a corrected patch that fully addresses the vulnerability without introducing token minting issues, and apply it promptly once available. 3. Restrict access to the 'ninja-forms-views' REST API endpoints by implementing IP whitelisting or authentication requirements at the web server or application firewall level. 4. Audit and rotate any potentially leaked bearer tokens to prevent unauthorized access. 5. Implement logging and monitoring for unusual API requests targeting Ninja Forms endpoints to detect exploitation attempts early. 6. Consider temporarily disabling the Submissions Table block or the REST API endpoints related to Ninja Forms if immediate patching is not possible. 7. Educate web administrators about the risks of using bearer tokens and the importance of secure token management. 8. Conduct a thorough review of stored form submissions for signs of unauthorized access or data exfiltration. 9. Employ web application firewalls (WAFs) with custom rules to block suspicious REST API calls related to Ninja Forms. 10. Ensure regular backups of website data to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-17T18:54:25.934Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694254ebbd21432f8e5297b8

Added to database: 12/17/2025, 6:59:55 AM

Last enriched: 12/24/2025, 8:18:21 AM

Last updated: 2/7/2026, 10:42:23 AM

Views: 128

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats