Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11924: CWE-639 Authorization Bypass Through User-Controlled Key in kstover Ninja Forms – The Contact Form Builder That Grows With You

0
High
VulnerabilityCVE-2025-11924cvecve-2025-11924cwe-639
Published: Wed Dec 17 2025 (12/17/2025, 06:42:30 UTC)
Source: CVE Database V5
Vendor/Project: kstover
Product: Ninja Forms – The Contact Form Builder That Grows With You

Description

The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.13.2. This is due to the plugin not properly verifying that a user is authorized before the `ninja-forms-views` REST endpoints return form metadata and submission content. This makes it possible for unauthenticated attackers to read arbitrary form definitions and submission records via a leaked bearer token granted they can load any page containing the Submissions Table block. NOTE: The developer released a patch for this issue in 3.13.1, but inadvertently introduced a REST API endpoint in which a valid bearer token could be minted for arbitrary form IDs, making this patch ineffective.

AI-Powered Analysis

AILast updated: 12/17/2025, 07:14:52 UTC

Technical Analysis

CVE-2025-11924 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Ninja Forms plugin for WordPress, versions up to and including 3.13.2. The vulnerability stems from the plugin's failure to properly verify user authorization before returning form metadata and submission content via the `ninja-forms-views` REST API endpoints. This improper access control allows unauthenticated attackers to retrieve arbitrary form definitions and submission records if they possess or can obtain a leaked bearer token. The initial patch released in version 3.13.1 attempted to fix this issue but inadvertently introduced a new REST API endpoint that allows minting of valid bearer tokens for arbitrary form IDs, effectively bypassing the intended fix. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers. The impact is primarily on confidentiality, as attackers can access sensitive form submission data, potentially including personal or confidential information submitted by users. The CVSS v3.1 score is 7.5 (high), reflecting the ease of exploitation and the significant confidentiality impact. No known exploits are currently reported in the wild, but the vulnerability's nature and accessibility make it a critical concern for sites using this plugin. The plugin is widely used in WordPress environments, which are prevalent across many European organizations for web presence and customer interaction.

Potential Impact

The primary impact of CVE-2025-11924 is unauthorized disclosure of sensitive information submitted through Ninja Forms on WordPress sites. European organizations using this plugin to collect user data—such as contact details, feedback, or other personal information—face risks of data breaches that could violate GDPR and other privacy regulations. Exposure of form submissions can lead to reputational damage, regulatory fines, and loss of customer trust. Since the vulnerability allows remote, unauthenticated access to form data, attackers can exploit it at scale, potentially targeting multiple organizations. The lack of integrity or availability impact reduces the risk of service disruption but does not diminish the severity of confidentiality loss. Organizations in sectors such as finance, healthcare, education, and government, which often collect sensitive data via web forms, are particularly vulnerable. Additionally, the ease of exploitation and the plugin’s popularity increase the likelihood of targeted or opportunistic attacks within Europe.

Mitigation Recommendations

1. Immediately monitor for updates from the Ninja Forms plugin developer and apply patches once a fully effective fix is released, as the current patch (3.13.1) is ineffective. 2. Temporarily restrict access to the `ninja-forms-views` REST API endpoints by implementing web application firewall (WAF) rules or server-level access controls to limit requests to authenticated and authorized users only. 3. Audit and rotate any bearer tokens or API keys associated with Ninja Forms to prevent misuse of leaked or minted tokens. 4. Implement strict logging and monitoring of REST API access patterns to detect unusual or unauthorized access attempts. 5. Review and minimize the exposure of sensitive form data stored or transmitted by the plugin, including encrypting stored submissions where possible. 6. Educate site administrators on the risks of installing plugins without timely updates and encourage regular security assessments of WordPress environments. 7. Consider temporarily disabling the Ninja Forms plugin or replacing it with alternative contact form solutions until a secure version is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-17T18:54:25.934Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694254ebbd21432f8e5297b8

Added to database: 12/17/2025, 6:59:55 AM

Last enriched: 12/17/2025, 7:14:52 AM

Last updated: 12/17/2025, 9:04:53 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats