Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce

0
Medium
VulnerabilityCVE-2025-12469cvecve-2025-12469cwe-862
Published: Wed Nov 05 2025 (11/05/2025, 09:27:40 UTC)
Source: CVE Database V5
Vendor/Project: amans2k
Product: FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce

Description

The FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.6.4.1. This is due to the plugin not properly verifying that a user is authorized to perform administrative actions in the `bwfan_test_email` AJAX handler. The nonce used for verification is publicly exposed to all visitors (including unauthenticated users) via the frontend JavaScript localization, and the `check_nonce()` function accepts low-privilege authenticated users who possess this nonce. This makes it possible for authenticated attackers, with Subscriber-level access and above, to send arbitrary emails from the site with attacker-controlled subject and body content.

AI-Powered Analysis

AILast updated: 11/05/2025, 09:52:40 UTC

Technical Analysis

CVE-2025-12469 is a missing authorization vulnerability (CWE-862) in the FunnelKit Automations – Email Marketing Automation and CRM plugin for WordPress and WooCommerce, affecting all versions up to 3.6.4.1. The vulnerability exists in the AJAX handler 'bwfan_test_email', which is designed to send test emails. The plugin uses a nonce for request verification; however, this nonce is publicly exposed in frontend JavaScript localization, making it accessible to all visitors, including unauthenticated users. Furthermore, the 'check_nonce()' function accepts this nonce from low-privilege authenticated users such as Subscribers, who normally should not have administrative capabilities. This improper authorization check allows these users to invoke the AJAX handler to send arbitrary emails with attacker-controlled subject and body content. The attack vector is remote and network-based, requiring only low-privilege authentication and no user interaction. The vulnerability does not impact confidentiality or availability directly but compromises integrity by enabling unauthorized email sending, which can be leveraged for phishing, spam, or social engineering attacks. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited scope and impact but ease of exploitation. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. Organizations using this plugin should be aware of the risk of abuse of their email systems and potential reputational harm.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized sending of emails from legitimate domains, undermining trust in corporate communications and potentially facilitating phishing or social engineering attacks targeting employees, customers, or partners. Attackers could leverage this to distribute malware, steal credentials, or conduct fraud. Since the plugin is widely used in WordPress and WooCommerce sites, especially in e-commerce and marketing sectors, the impact includes reputational damage, customer trust erosion, and possible regulatory scrutiny under GDPR if personal data is compromised via phishing. The vulnerability does not directly affect data confidentiality or system availability but compromises the integrity of email communications, which can have cascading effects on business operations and security posture. Organizations relying on FunnelKit Automations for email marketing or CRM functions should consider this a significant risk vector, especially if subscriber-level accounts are easily obtainable or if internal users are compromised.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the vulnerable AJAX handler by implementing server-side authorization checks that verify user roles properly, ensuring only administrators or trusted roles can invoke email-sending functions. Organizations should remove or obfuscate the nonce from frontend JavaScript localization to prevent exposure to unauthenticated users. Applying web application firewalls (WAF) rules to detect and block suspicious AJAX requests targeting 'bwfan_test_email' can provide temporary protection. Monitoring outgoing emails for unusual patterns or volumes can help detect exploitation attempts. Since no official patch is currently available, organizations should consider disabling the FunnelKit Automations plugin temporarily if email sending abuse is detected. Additionally, enforcing strong user account management to limit subscriber account creation and monitoring for compromised credentials reduces risk. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-29T15:32:21.770Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690b1bd197eccd907387bdcb

Added to database: 11/5/2025, 9:41:37 AM

Last enriched: 11/5/2025, 9:52:40 AM

Last updated: 11/5/2025, 10:42:25 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats