CVE-2025-11991: CWE-862 Missing Authorization in jetmonsters JetFormBuilder — Dynamic Blocks Form Builder
The JetFormBuilder — Dynamic Blocks Form Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the run_callback function in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to generate forms using AI, consuming site's AI usage limits.
AI Analysis
Technical Summary
CVE-2025-11991 identifies a missing authorization vulnerability (CWE-862) in the JetFormBuilder — Dynamic Blocks Form Builder plugin for WordPress, versions up to and including 3.5.3. The core issue lies in the run_callback function, which lacks proper capability checks, allowing unauthenticated attackers to invoke AI-based form generation features. This flaw enables attackers to create forms dynamically without permission, leading to unauthorized modification of data and consumption of the site's AI usage limits. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing its risk profile. Although it does not directly expose sensitive data or cause denial of service, the unauthorized data modification can undermine the integrity of form data and potentially disrupt normal site operations by exhausting AI resource quotas. No patches are currently linked, and no active exploits have been reported, but the vulnerability's presence in a widely used WordPress plugin makes it a notable risk. The CVSS 3.1 base score of 5.3 reflects a medium severity, emphasizing the need for timely remediation. The vulnerability highlights the importance of implementing robust authorization checks in plugin callback functions to prevent unauthorized access and abuse of site resources.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized use of AI form generation capabilities, resulting in resource exhaustion and potential disruption of legitimate site functionalities. While it does not compromise confidentiality or availability directly, the integrity of form data can be affected, potentially leading to inaccurate or maliciously altered submissions. Organizations relying on AI-driven forms for customer interaction, data collection, or automated workflows may experience degraded service quality or increased operational costs due to excessive AI usage. Additionally, attackers could leverage this flaw to conduct further attacks by injecting malicious data or manipulating form outputs. The impact is more pronounced for organizations with high traffic WordPress sites using JetFormBuilder, especially those in sectors like e-commerce, public services, or digital marketing where form integrity is critical. Failure to address this vulnerability could also damage organizational reputation and trust among users.
Mitigation Recommendations
Immediate mitigation steps include disabling the AI form generation feature in JetFormBuilder if feasible, to prevent unauthorized use until a patch is available. Organizations should monitor AI usage metrics closely to detect unusual spikes indicative of exploitation. Implementing web application firewalls (WAF) with custom rules to block suspicious requests targeting the run_callback function can reduce exposure. Restricting access to the plugin’s endpoints by IP whitelisting or authentication proxies adds an additional security layer. Administrators should keep WordPress core and all plugins updated and subscribe to vendor advisories for patch releases. Reviewing and tightening user roles and permissions within WordPress can help limit potential abuse. Finally, conducting regular security audits and penetration testing focused on plugin vulnerabilities will improve overall resilience against similar authorization flaws.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-11991: CWE-862 Missing Authorization in jetmonsters JetFormBuilder — Dynamic Blocks Form Builder
Description
The JetFormBuilder — Dynamic Blocks Form Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the run_callback function in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to generate forms using AI, consuming site's AI usage limits.
AI-Powered Analysis
Technical Analysis
CVE-2025-11991 identifies a missing authorization vulnerability (CWE-862) in the JetFormBuilder — Dynamic Blocks Form Builder plugin for WordPress, versions up to and including 3.5.3. The core issue lies in the run_callback function, which lacks proper capability checks, allowing unauthenticated attackers to invoke AI-based form generation features. This flaw enables attackers to create forms dynamically without permission, leading to unauthorized modification of data and consumption of the site's AI usage limits. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing its risk profile. Although it does not directly expose sensitive data or cause denial of service, the unauthorized data modification can undermine the integrity of form data and potentially disrupt normal site operations by exhausting AI resource quotas. No patches are currently linked, and no active exploits have been reported, but the vulnerability's presence in a widely used WordPress plugin makes it a notable risk. The CVSS 3.1 base score of 5.3 reflects a medium severity, emphasizing the need for timely remediation. The vulnerability highlights the importance of implementing robust authorization checks in plugin callback functions to prevent unauthorized access and abuse of site resources.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized use of AI form generation capabilities, resulting in resource exhaustion and potential disruption of legitimate site functionalities. While it does not compromise confidentiality or availability directly, the integrity of form data can be affected, potentially leading to inaccurate or maliciously altered submissions. Organizations relying on AI-driven forms for customer interaction, data collection, or automated workflows may experience degraded service quality or increased operational costs due to excessive AI usage. Additionally, attackers could leverage this flaw to conduct further attacks by injecting malicious data or manipulating form outputs. The impact is more pronounced for organizations with high traffic WordPress sites using JetFormBuilder, especially those in sectors like e-commerce, public services, or digital marketing where form integrity is critical. Failure to address this vulnerability could also damage organizational reputation and trust among users.
Mitigation Recommendations
Immediate mitigation steps include disabling the AI form generation feature in JetFormBuilder if feasible, to prevent unauthorized use until a patch is available. Organizations should monitor AI usage metrics closely to detect unusual spikes indicative of exploitation. Implementing web application firewalls (WAF) with custom rules to block suspicious requests targeting the run_callback function can reduce exposure. Restricting access to the plugin’s endpoints by IP whitelisting or authentication proxies adds an additional security layer. Administrators should keep WordPress core and all plugins updated and subscribe to vendor advisories for patch releases. Reviewing and tightening user roles and permissions within WordPress can help limit potential abuse. Finally, conducting regular security audits and penetration testing focused on plugin vulnerabilities will improve overall resilience against similar authorization flaws.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-20T19:44:03.576Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69410b259bfd1ab9ba9ec080
Added to database: 12/16/2025, 7:32:53 AM
Last enriched: 12/16/2025, 7:48:10 AM
Last updated: 12/16/2025, 10:48:44 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14002: CWE-287 Improper Authentication in whyun WPCOM Member
HighCVE-2025-13231: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in radykal Fancy Product Designer
MediumCVE-2025-68088: Missing Authorization in merkulove Huger for Elementor
UnknownCVE-2025-68087: Missing Authorization in merkulove Modalier for Elementor
UnknownCVE-2025-68086: Missing Authorization in merkulove Reformer for Elementor
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.