Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12535: CWE-352 Cross-Site Request Forgery (CSRF) in brainstormforce SureForms – Contact Form, Custom Form Builder, Calculator & More

0
Medium
VulnerabilityCVE-2025-12535cvecve-2025-12535cwe-352
Published: Wed Nov 19 2025 (11/19/2025, 06:45:25 UTC)
Source: CVE Database V5
Vendor/Project: brainstormforce
Product: SureForms – Contact Form, Custom Form Builder, Calculator & More

Description

The SureForms plugin for WordPress is vulnerable to Cross-Site Request Forgery Bypass in all versions up to, and including, 1.13.1. This is due to the plugin distributing generic WordPress REST API nonces (wp_rest) to unauthenticated users via the 'wp_ajax_nopriv_rest-nonce' action. While the plugin legitimately needs to support unauthenticated form submissions, it incorrectly uses generic REST nonces instead of form-specific nonces. This makes it possible for unauthenticated attackers to bypass CSRF protection on REST API endpoints that rely solely on nonce verification without additional authentication checks, allowing them to trigger unauthorized actions such as the plugin's own post-submission hooks and potentially other plugins' REST endpoints.

AI-Powered Analysis

AILast updated: 11/19/2025, 07:13:13 UTC

Technical Analysis

The SureForms plugin for WordPress, widely used for contact forms, custom forms, and calculators, contains a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-12535. This vulnerability arises because the plugin distributes generic WordPress REST API nonces (wp_rest) to unauthenticated users through the 'wp_ajax_nopriv_rest-nonce' action. Normally, nonces are used to protect against CSRF by ensuring that requests originate from legitimate users. However, SureForms incorrectly uses generic REST nonces instead of form-specific nonces, which means that any unauthenticated attacker can obtain a valid nonce and use it to bypass CSRF protections on REST API endpoints that rely solely on nonce verification without additional authentication or authorization checks. This allows attackers to perform unauthorized actions, such as triggering the plugin’s post-submission hooks, which could lead to data manipulation or execution of unintended workflows. Furthermore, because the vulnerability affects REST endpoints, it might also impact other plugins that rely on similar nonce-based protections. The vulnerability affects all versions up to and including 1.13.1, with no patch currently available. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. No known exploits have been reported in the wild as of the publication date. The root cause is the improper use of generic nonces for unauthenticated REST API access, which is a deviation from best practices that recommend form-specific nonces or additional authentication layers for sensitive operations.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of data and operations handled through the SureForms plugin on WordPress sites. Attackers can exploit the CSRF bypass to submit unauthorized form data or trigger backend actions without authentication, potentially leading to data corruption, unauthorized workflow execution, or manipulation of form-related processes. While confidentiality and availability are not directly impacted, the integrity compromise can undermine trust in web applications, cause operational disruptions, or facilitate further attacks if chained with other vulnerabilities. Organizations relying on SureForms for customer interactions, lead generation, or internal workflows may face reputational damage and operational inefficiencies. Since the vulnerability affects unauthenticated REST API endpoints, public-facing WordPress sites are particularly vulnerable. The lack of known exploits reduces immediate risk, but the medium severity and ease of exploitation warrant proactive mitigation, especially in sectors with stringent data integrity requirements such as finance, healthcare, and e-commerce prevalent in Europe.

Mitigation Recommendations

1. Monitor the SureForms plugin vendor announcements closely and apply security patches immediately once available. 2. Until a patch is released, implement additional server-side validation to enforce form-specific nonce checks rather than relying on generic REST API nonces. 3. Restrict REST API access to authenticated users where possible, especially for endpoints that trigger sensitive actions or workflows. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious REST API requests that could indicate CSRF exploitation attempts. 5. Conduct thorough code reviews and security testing on custom forms and REST API endpoints to ensure proper nonce usage and authentication enforcement. 6. Educate development teams about secure nonce implementation and the risks of exposing generic nonces to unauthenticated users. 7. Regularly audit WordPress plugins for security compliance and remove or replace plugins that do not follow best security practices. 8. Use security plugins that can monitor and alert on unusual REST API activity or unauthorized form submissions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-30T19:51:09.849Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691d6a73a27e6d5e91bd8394

Added to database: 11/19/2025, 6:57:55 AM

Last enriched: 11/19/2025, 7:13:13 AM

Last updated: 11/19/2025, 8:13:08 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats