Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11991: CWE-862 Missing Authorization in jetmonsters JetFormBuilder — Dynamic Blocks Form Builder

0
Medium
VulnerabilityCVE-2025-11991cvecve-2025-11991cwe-862
Published: Tue Dec 16 2025 (12/16/2025, 07:21:06 UTC)
Source: CVE Database V5
Vendor/Project: jetmonsters
Product: JetFormBuilder — Dynamic Blocks Form Builder

Description

The JetFormBuilder — Dynamic Blocks Form Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the run_callback function in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to generate forms using AI, consuming site's AI usage limits.

AI-Powered Analysis

AILast updated: 12/16/2025, 07:48:10 UTC

Technical Analysis

CVE-2025-11991 identifies a missing authorization vulnerability (CWE-862) in the JetFormBuilder — Dynamic Blocks Form Builder plugin for WordPress, versions up to and including 3.5.3. The core issue lies in the run_callback function, which lacks proper capability checks, allowing unauthenticated attackers to invoke AI-based form generation features. This flaw enables attackers to create forms dynamically without permission, leading to unauthorized modification of data and consumption of the site's AI usage limits. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing its risk profile. Although it does not directly expose sensitive data or cause denial of service, the unauthorized data modification can undermine the integrity of form data and potentially disrupt normal site operations by exhausting AI resource quotas. No patches are currently linked, and no active exploits have been reported, but the vulnerability's presence in a widely used WordPress plugin makes it a notable risk. The CVSS 3.1 base score of 5.3 reflects a medium severity, emphasizing the need for timely remediation. The vulnerability highlights the importance of implementing robust authorization checks in plugin callback functions to prevent unauthorized access and abuse of site resources.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized use of AI form generation capabilities, resulting in resource exhaustion and potential disruption of legitimate site functionalities. While it does not compromise confidentiality or availability directly, the integrity of form data can be affected, potentially leading to inaccurate or maliciously altered submissions. Organizations relying on AI-driven forms for customer interaction, data collection, or automated workflows may experience degraded service quality or increased operational costs due to excessive AI usage. Additionally, attackers could leverage this flaw to conduct further attacks by injecting malicious data or manipulating form outputs. The impact is more pronounced for organizations with high traffic WordPress sites using JetFormBuilder, especially those in sectors like e-commerce, public services, or digital marketing where form integrity is critical. Failure to address this vulnerability could also damage organizational reputation and trust among users.

Mitigation Recommendations

Immediate mitigation steps include disabling the AI form generation feature in JetFormBuilder if feasible, to prevent unauthorized use until a patch is available. Organizations should monitor AI usage metrics closely to detect unusual spikes indicative of exploitation. Implementing web application firewalls (WAF) with custom rules to block suspicious requests targeting the run_callback function can reduce exposure. Restricting access to the plugin’s endpoints by IP whitelisting or authentication proxies adds an additional security layer. Administrators should keep WordPress core and all plugins updated and subscribe to vendor advisories for patch releases. Reviewing and tightening user roles and permissions within WordPress can help limit potential abuse. Finally, conducting regular security audits and penetration testing focused on plugin vulnerabilities will improve overall resilience against similar authorization flaws.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-20T19:44:03.576Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69410b259bfd1ab9ba9ec080

Added to database: 12/16/2025, 7:32:53 AM

Last enriched: 12/16/2025, 7:48:10 AM

Last updated: 12/16/2025, 10:48:44 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats