Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12353: CWE-639 Authorization Bypass Through User-Controlled Key in getwpfunnels Easy WordPress Funnel Builder To Collect Leads And Increase Sales – WPFunnels

0
Medium
VulnerabilityCVE-2025-12353cvecve-2025-12353cwe-639
Published: Sat Nov 08 2025 (11/08/2025, 03:27:47 UTC)
Source: CVE Database V5
Vendor/Project: getwpfunnels
Product: Easy WordPress Funnel Builder To Collect Leads And Increase Sales – WPFunnels

Description

The WPFunnels – The Easiest Funnel Builder For WordPress And WooCommerce To Collect Leads And Increase Sales plugin for WordPress is vulnerable to unauthorized user registration in all versions up to, and including, 3.6.2. This is due to the plugin relying on a user controlled value 'optin_allow_registration' to determine if user registration is allowed, instead of the site-specific setting. This makes it possible for unauthenticated attackers to register new user accounts, even when user registration is disabled.

AI-Powered Analysis

AILast updated: 11/15/2025, 04:47:18 UTC

Technical Analysis

CVE-2025-12353 is an authorization bypass vulnerability affecting the WPFunnels plugin for WordPress and WooCommerce, which is widely used to build sales funnels and collect leads. The vulnerability exists in all versions up to and including 3.6.2. The root cause is that the plugin relies on a user-controlled input parameter named 'optin_allow_registration' to determine whether user registration is permitted. Instead of enforcing the site-wide registration setting configured in WordPress, the plugin trusts this parameter, which can be manipulated by unauthenticated attackers. This design flaw allows attackers to bypass the intended restriction on user registrations and create new user accounts without any authentication or user interaction. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key). The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity by allowing unauthorized account creation. Although no exploits are known in the wild yet, the vulnerability poses a risk to the integrity of affected sites by enabling unauthorized access through new accounts, which could be leveraged for further attacks such as privilege escalation, spam, or phishing campaigns. The vulnerability affects all versions of the plugin up to 3.6.2, and no official patches or updates are currently linked, indicating that users must monitor vendor advisories closely. The flaw is particularly concerning for sites that have disabled user registration to prevent unauthorized access or spam accounts, as this setting is effectively bypassed.

Potential Impact

For European organizations, the impact of CVE-2025-12353 primarily concerns the integrity of their WordPress-based websites using the WPFunnels plugin. Unauthorized user registrations can lead to multiple downstream risks including spam account creation, abuse of site resources, potential privilege escalation if default roles are assigned to new users, and reputational damage if attackers use the platform for phishing or malicious content distribution. E-commerce and marketing sites relying on WPFunnels for lead collection and sales funnels are especially vulnerable, as unauthorized accounts could disrupt customer data integrity or enable fraudulent transactions. Although confidentiality and availability are not directly affected, the presence of unauthorized accounts can complicate incident response and increase the attack surface. Given the widespread use of WordPress in Europe and the popularity of WooCommerce, many small and medium enterprises could be exposed. The lack of authentication or user interaction required for exploitation means attackers can automate account creation at scale, potentially leading to large-scale abuse. This vulnerability could also be leveraged as a foothold for more sophisticated attacks if combined with other vulnerabilities or misconfigurations.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability. First, they should verify if their WordPress sites use the WPFunnels plugin and identify the version in use. Until an official patch is released, organizations should consider disabling the plugin or its user registration features if feasible. Implementing web application firewall (WAF) rules to detect and block requests containing the 'optin_allow_registration' parameter or anomalous registration attempts can reduce exploitation risk. Monitoring user registration logs for unusual patterns or spikes in new accounts is critical to early detection. Restricting the default role assigned to new users to the least privileged level can limit potential damage. Organizations should also review and tighten WordPress user registration settings and consider additional CAPTCHA or multi-factor authentication on registration forms. Once the vendor releases a patch, prompt application of updates is essential. Additionally, security teams should educate site administrators about this vulnerability and encourage regular plugin updates and security audits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T15:11:29.679Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690ebeb03a8fd010ecf64256

Added to database: 11/8/2025, 3:53:20 AM

Last enriched: 11/15/2025, 4:47:18 AM

Last updated: 12/22/2025, 3:12:13 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats