Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12167: CWE-862 Missing Authorization in rnzo Contact Form 7 AWeber Extension

0
Medium
VulnerabilityCVE-2025-12167cvecve-2025-12167cwe-862
Published: Sat Nov 08 2025 (11/08/2025, 03:27:45 UTC)
Source: CVE Database V5
Vendor/Project: rnzo
Product: Contact Form 7 AWeber Extension

Description

The Contact Form 7 AWeber Extension plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_aweber_logreset' AJAX endpoint in all versions up to, and including, 0.1.42. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the AWeber logs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:14:59 UTC

Technical Analysis

CVE-2025-12167 is a vulnerability identified in the rnzo Contact Form 7 AWeber Extension plugin for WordPress, affecting all versions up to and including 0.1.42. The issue stems from a missing authorization check (CWE-862) on the AJAX endpoint 'wp_ajax_aweber_logreset', which is intended to reset AWeber logs. This endpoint can be accessed by any authenticated user with at least Subscriber-level privileges, which are typically granted to low-privilege users on WordPress sites. Because the plugin fails to verify whether the user has the appropriate capability to perform this action, an attacker with minimal access can reset logs without proper authorization. The vulnerability has a CVSS 3.1 base score of 4.3, indicating medium severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), limited integrity impact (I:L), and no availability impact (A:N). The primary risk is the unauthorized modification of log data, which could be leveraged to erase evidence of malicious activity or interfere with audit processes. No patches or fixes have been published at the time of disclosure, and no active exploitation has been reported. The vulnerability is relevant to any WordPress site using this plugin, which integrates Contact Form 7 with AWeber email marketing services.

Potential Impact

The vulnerability allows attackers with Subscriber-level access or higher to reset AWeber logs without authorization, compromising the integrity of log data. This can hinder incident response and forensic investigations by erasing or altering records of plugin activity. While it does not directly expose sensitive data or disrupt service availability, the ability to manipulate logs can facilitate stealthy attacks or cover tracks after other malicious actions. Organizations relying on these logs for compliance, auditing, or security monitoring may face increased risk of undetected compromise. Since Subscriber-level access is relatively low privilege, the attack surface is broader than vulnerabilities requiring administrator rights. The impact is particularly significant for sites that depend on accurate logging for security or regulatory reasons. However, the lack of known exploits and the medium CVSS score suggest the threat is moderate but should not be ignored.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and restrict user roles and permissions, ensuring that Subscriber-level users are limited and monitored closely. Implement strict access controls to minimize the number of users with authenticated access. Employ Web Application Firewalls (WAFs) to detect and block unauthorized AJAX requests targeting the 'wp_ajax_aweber_logreset' endpoint. Monitor logs for unusual reset activities or repeated access to this endpoint. Until an official patch is released, consider temporarily disabling or removing the Contact Form 7 AWeber Extension plugin if feasible. Additionally, site administrators should keep WordPress core and all plugins updated and subscribe to vendor advisories for timely patch deployment. Implementing multi-factor authentication (MFA) can reduce the risk of compromised accounts being used to exploit this flaw. Finally, conduct regular security audits and log integrity checks to detect tampering.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-24T14:19:43.666Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690ebeaf3a8fd010ecf6422f

Added to database: 11/8/2025, 3:53:19 AM

Last enriched: 2/27/2026, 8:14:59 PM

Last updated: 3/25/2026, 4:24:43 AM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses