CVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
The FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.6.4.1. This is due to the plugin not properly verifying that a user is authorized to perform administrative actions in the `bwfan_test_email` AJAX handler. The nonce used for verification is publicly exposed to all visitors (including unauthenticated users) via the frontend JavaScript localization, and the `check_nonce()` function accepts low-privilege authenticated users who possess this nonce. This makes it possible for authenticated attackers, with Subscriber-level access and above, to send arbitrary emails from the site with attacker-controlled subject and body content.
AI Analysis
Technical Summary
CVE-2025-12469 is a Missing Authorization vulnerability (CWE-862) found in the FunnelKit Automations – Email Marketing Automation and CRM plugin for WordPress and WooCommerce, affecting all versions up to 3.6.4.1. The vulnerability exists because the plugin fails to properly verify that a user is authorized to perform administrative actions within the bwfan_test_email AJAX handler. Specifically, the nonce used for verification is exposed publicly via frontend JavaScript localization, making it accessible to all visitors, including unauthenticated users. The check_nonce() function accepts this nonce from low-privilege authenticated users (Subscriber-level and above), allowing them to bypass intended authorization controls. As a result, an attacker with minimal privileges can send arbitrary emails from the site, controlling both the subject and body content. This can be exploited to conduct phishing attacks, spam distribution, or reputation damage by sending malicious or misleading emails appearing to originate from the legitimate domain. The vulnerability does not impact confidentiality or availability directly but compromises the integrity of outbound email communications. The CVSS v3.1 score is 4.3 (medium), reflecting network attack vector, low complexity, low privileges required, no user interaction, and limited impact on integrity only. No patches or known exploits are currently reported, but the public exposure of the nonce and low privilege requirement make exploitation feasible. The plugin is widely used in WordPress e-commerce and marketing contexts, increasing the attack surface for organizations using it.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of their email communications. Attackers could leverage the flaw to send phishing emails or spam that appear to come from trusted corporate domains, potentially leading to credential theft, malware infections, or reputational damage. This can undermine customer trust and lead to regulatory scrutiny under GDPR if personal data is compromised via phishing. Organizations relying on WordPress and WooCommerce with FunnelKit Automations installed are at risk, especially e-commerce, marketing agencies, and SMEs that use the plugin for customer engagement. The ability for low-privilege users to abuse email functionality could also facilitate internal misuse or lateral movement if subscriber accounts are compromised. While the vulnerability does not directly impact system availability or confidentiality, the indirect consequences of successful phishing campaigns and brand damage can be significant. European entities with strict email security policies and compliance requirements should consider this a moderate threat requiring timely remediation.
Mitigation Recommendations
1. Immediately update the FunnelKit Automations plugin to a patched version once available; monitor vendor announcements for patches. 2. In the interim, restrict access to the bwfan_test_email AJAX handler by implementing custom access controls or disabling the feature if not essential. 3. Remove or obfuscate the nonce exposure in frontend JavaScript localization to prevent unauthorized users from obtaining it. 4. Harden WordPress user roles by minimizing the number of users with Subscriber-level or higher privileges and auditing user accounts regularly. 5. Implement email authentication standards such as SPF, DKIM, and DMARC to reduce the impact of spoofed emails sent via this vulnerability. 6. Monitor outbound email logs for unusual or unauthorized email sending activity originating from the site. 7. Educate users and administrators about the risk of phishing emails that may appear to come from internal sources. 8. Consider deploying web application firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting the AJAX handler. 9. Regularly review and update WordPress and plugin security configurations to minimize attack surface.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
Description
The FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.6.4.1. This is due to the plugin not properly verifying that a user is authorized to perform administrative actions in the `bwfan_test_email` AJAX handler. The nonce used for verification is publicly exposed to all visitors (including unauthenticated users) via the frontend JavaScript localization, and the `check_nonce()` function accepts low-privilege authenticated users who possess this nonce. This makes it possible for authenticated attackers, with Subscriber-level access and above, to send arbitrary emails from the site with attacker-controlled subject and body content.
AI-Powered Analysis
Technical Analysis
CVE-2025-12469 is a Missing Authorization vulnerability (CWE-862) found in the FunnelKit Automations – Email Marketing Automation and CRM plugin for WordPress and WooCommerce, affecting all versions up to 3.6.4.1. The vulnerability exists because the plugin fails to properly verify that a user is authorized to perform administrative actions within the bwfan_test_email AJAX handler. Specifically, the nonce used for verification is exposed publicly via frontend JavaScript localization, making it accessible to all visitors, including unauthenticated users. The check_nonce() function accepts this nonce from low-privilege authenticated users (Subscriber-level and above), allowing them to bypass intended authorization controls. As a result, an attacker with minimal privileges can send arbitrary emails from the site, controlling both the subject and body content. This can be exploited to conduct phishing attacks, spam distribution, or reputation damage by sending malicious or misleading emails appearing to originate from the legitimate domain. The vulnerability does not impact confidentiality or availability directly but compromises the integrity of outbound email communications. The CVSS v3.1 score is 4.3 (medium), reflecting network attack vector, low complexity, low privileges required, no user interaction, and limited impact on integrity only. No patches or known exploits are currently reported, but the public exposure of the nonce and low privilege requirement make exploitation feasible. The plugin is widely used in WordPress e-commerce and marketing contexts, increasing the attack surface for organizations using it.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of their email communications. Attackers could leverage the flaw to send phishing emails or spam that appear to come from trusted corporate domains, potentially leading to credential theft, malware infections, or reputational damage. This can undermine customer trust and lead to regulatory scrutiny under GDPR if personal data is compromised via phishing. Organizations relying on WordPress and WooCommerce with FunnelKit Automations installed are at risk, especially e-commerce, marketing agencies, and SMEs that use the plugin for customer engagement. The ability for low-privilege users to abuse email functionality could also facilitate internal misuse or lateral movement if subscriber accounts are compromised. While the vulnerability does not directly impact system availability or confidentiality, the indirect consequences of successful phishing campaigns and brand damage can be significant. European entities with strict email security policies and compliance requirements should consider this a moderate threat requiring timely remediation.
Mitigation Recommendations
1. Immediately update the FunnelKit Automations plugin to a patched version once available; monitor vendor announcements for patches. 2. In the interim, restrict access to the bwfan_test_email AJAX handler by implementing custom access controls or disabling the feature if not essential. 3. Remove or obfuscate the nonce exposure in frontend JavaScript localization to prevent unauthorized users from obtaining it. 4. Harden WordPress user roles by minimizing the number of users with Subscriber-level or higher privileges and auditing user accounts regularly. 5. Implement email authentication standards such as SPF, DKIM, and DMARC to reduce the impact of spoofed emails sent via this vulnerability. 6. Monitor outbound email logs for unusual or unauthorized email sending activity originating from the site. 7. Educate users and administrators about the risk of phishing emails that may appear to come from internal sources. 8. Consider deploying web application firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting the AJAX handler. 9. Regularly review and update WordPress and plugin security configurations to minimize attack surface.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-29T15:32:21.770Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690b1bd197eccd907387bdcb
Added to database: 11/5/2025, 9:41:37 AM
Last enriched: 11/12/2025, 10:40:47 AM
Last updated: 12/19/2025, 3:26:16 PM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66906: n/a
UnknownCVE-2024-30896: n/a
CriticalCVE-2025-66908: n/a
HighCVE-2025-14952: SQL Injection in Campcodes Supplier Management System
MediumCVE-2025-66910: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.