CVE-2025-11924: CWE-639 Authorization Bypass Through User-Controlled Key in kstover Ninja Forms – The Contact Form Builder That Grows With You
The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.13.2. This is due to the plugin not properly verifying that a user is authorized before the `ninja-forms-views` REST endpoints return form metadata and submission content. This makes it possible for unauthenticated attackers to read arbitrary form definitions and submission records via a leaked bearer token granted they can load any page containing the Submissions Table block. NOTE: The developer released a patch for this issue in 3.13.1, but inadvertently introduced a REST API endpoint in which a valid bearer token could be minted for arbitrary form IDs, making this patch ineffective.
AI Analysis
Technical Summary
CVE-2025-11924 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Ninja Forms plugin for WordPress, versions up to and including 3.13.2. The vulnerability stems from the plugin's failure to properly verify user authorization before returning form metadata and submission content via the `ninja-forms-views` REST API endpoints. This improper access control allows unauthenticated attackers to retrieve arbitrary form definitions and submission records if they possess or can obtain a leaked bearer token. The initial patch released in version 3.13.1 attempted to fix this issue but inadvertently introduced a new REST API endpoint that allows minting of valid bearer tokens for arbitrary form IDs, effectively bypassing the intended fix. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers. The impact is primarily on confidentiality, as attackers can access sensitive form submission data, potentially including personal or confidential information submitted by users. The CVSS v3.1 score is 7.5 (high), reflecting the ease of exploitation and the significant confidentiality impact. No known exploits are currently reported in the wild, but the vulnerability's nature and accessibility make it a critical concern for sites using this plugin. The plugin is widely used in WordPress environments, which are prevalent across many European organizations for web presence and customer interaction.
Potential Impact
The primary impact of CVE-2025-11924 is unauthorized disclosure of sensitive information submitted through Ninja Forms on WordPress sites. European organizations using this plugin to collect user data—such as contact details, feedback, or other personal information—face risks of data breaches that could violate GDPR and other privacy regulations. Exposure of form submissions can lead to reputational damage, regulatory fines, and loss of customer trust. Since the vulnerability allows remote, unauthenticated access to form data, attackers can exploit it at scale, potentially targeting multiple organizations. The lack of integrity or availability impact reduces the risk of service disruption but does not diminish the severity of confidentiality loss. Organizations in sectors such as finance, healthcare, education, and government, which often collect sensitive data via web forms, are particularly vulnerable. Additionally, the ease of exploitation and the plugin’s popularity increase the likelihood of targeted or opportunistic attacks within Europe.
Mitigation Recommendations
1. Immediately monitor for updates from the Ninja Forms plugin developer and apply patches once a fully effective fix is released, as the current patch (3.13.1) is ineffective. 2. Temporarily restrict access to the `ninja-forms-views` REST API endpoints by implementing web application firewall (WAF) rules or server-level access controls to limit requests to authenticated and authorized users only. 3. Audit and rotate any bearer tokens or API keys associated with Ninja Forms to prevent misuse of leaked or minted tokens. 4. Implement strict logging and monitoring of REST API access patterns to detect unusual or unauthorized access attempts. 5. Review and minimize the exposure of sensitive form data stored or transmitted by the plugin, including encrypting stored submissions where possible. 6. Educate site administrators on the risks of installing plugins without timely updates and encourage regular security assessments of WordPress environments. 7. Consider temporarily disabling the Ninja Forms plugin or replacing it with alternative contact form solutions until a secure version is available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-11924: CWE-639 Authorization Bypass Through User-Controlled Key in kstover Ninja Forms – The Contact Form Builder That Grows With You
Description
The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.13.2. This is due to the plugin not properly verifying that a user is authorized before the `ninja-forms-views` REST endpoints return form metadata and submission content. This makes it possible for unauthenticated attackers to read arbitrary form definitions and submission records via a leaked bearer token granted they can load any page containing the Submissions Table block. NOTE: The developer released a patch for this issue in 3.13.1, but inadvertently introduced a REST API endpoint in which a valid bearer token could be minted for arbitrary form IDs, making this patch ineffective.
AI-Powered Analysis
Technical Analysis
CVE-2025-11924 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Ninja Forms plugin for WordPress, versions up to and including 3.13.2. The vulnerability stems from the plugin's failure to properly verify user authorization before returning form metadata and submission content via the `ninja-forms-views` REST API endpoints. This improper access control allows unauthenticated attackers to retrieve arbitrary form definitions and submission records if they possess or can obtain a leaked bearer token. The initial patch released in version 3.13.1 attempted to fix this issue but inadvertently introduced a new REST API endpoint that allows minting of valid bearer tokens for arbitrary form IDs, effectively bypassing the intended fix. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers. The impact is primarily on confidentiality, as attackers can access sensitive form submission data, potentially including personal or confidential information submitted by users. The CVSS v3.1 score is 7.5 (high), reflecting the ease of exploitation and the significant confidentiality impact. No known exploits are currently reported in the wild, but the vulnerability's nature and accessibility make it a critical concern for sites using this plugin. The plugin is widely used in WordPress environments, which are prevalent across many European organizations for web presence and customer interaction.
Potential Impact
The primary impact of CVE-2025-11924 is unauthorized disclosure of sensitive information submitted through Ninja Forms on WordPress sites. European organizations using this plugin to collect user data—such as contact details, feedback, or other personal information—face risks of data breaches that could violate GDPR and other privacy regulations. Exposure of form submissions can lead to reputational damage, regulatory fines, and loss of customer trust. Since the vulnerability allows remote, unauthenticated access to form data, attackers can exploit it at scale, potentially targeting multiple organizations. The lack of integrity or availability impact reduces the risk of service disruption but does not diminish the severity of confidentiality loss. Organizations in sectors such as finance, healthcare, education, and government, which often collect sensitive data via web forms, are particularly vulnerable. Additionally, the ease of exploitation and the plugin’s popularity increase the likelihood of targeted or opportunistic attacks within Europe.
Mitigation Recommendations
1. Immediately monitor for updates from the Ninja Forms plugin developer and apply patches once a fully effective fix is released, as the current patch (3.13.1) is ineffective. 2. Temporarily restrict access to the `ninja-forms-views` REST API endpoints by implementing web application firewall (WAF) rules or server-level access controls to limit requests to authenticated and authorized users only. 3. Audit and rotate any bearer tokens or API keys associated with Ninja Forms to prevent misuse of leaked or minted tokens. 4. Implement strict logging and monitoring of REST API access patterns to detect unusual or unauthorized access attempts. 5. Review and minimize the exposure of sensitive form data stored or transmitted by the plugin, including encrypting stored submissions where possible. 6. Educate site administrators on the risks of installing plugins without timely updates and encourage regular security assessments of WordPress environments. 7. Consider temporarily disabling the Ninja Forms plugin or replacing it with alternative contact form solutions until a secure version is available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-17T18:54:25.934Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694254ebbd21432f8e5297b8
Added to database: 12/17/2025, 6:59:55 AM
Last enriched: 12/17/2025, 7:14:52 AM
Last updated: 12/17/2025, 9:04:53 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14399: CWE-352 Cross-Site Request Forgery (CSRF) in wpcodefactory Download Plugins and Themes in ZIP from Dashboard
MediumCVE-2025-12496: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in dylanjkotze Zephyr Project Manager
MediumCVE-2025-14347: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Proliz Software Ltd. OBS (Student Affairs Information System)0
MediumCVE-2025-14061: CWE-862 Missing Authorization in wplegalpages Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent
MediumCVE-2025-13750: CWE-862 Missing Authorization in mateuszgbiorczyk Converter for Media – Optimize images | Convert WebP & AVIF
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.