Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12535: CWE-352 Cross-Site Request Forgery (CSRF) in brainstormforce SureForms – Contact Form, Custom Form Builder, Calculator & More

0
Medium
VulnerabilityCVE-2025-12535cvecve-2025-12535cwe-352
Published: Wed Nov 19 2025 (11/19/2025, 06:45:25 UTC)
Source: CVE Database V5
Vendor/Project: brainstormforce
Product: SureForms – Contact Form, Custom Form Builder, Calculator & More

Description

The SureForms plugin for WordPress is vulnerable to Cross-Site Request Forgery Bypass in all versions up to, and including, 1.13.1. This is due to the plugin distributing generic WordPress REST API nonces (wp_rest) to unauthenticated users via the 'wp_ajax_nopriv_rest-nonce' action. While the plugin legitimately needs to support unauthenticated form submissions, it incorrectly uses generic REST nonces instead of form-specific nonces. This makes it possible for unauthenticated attackers to bypass CSRF protection on REST API endpoints that rely solely on nonce verification without additional authentication checks, allowing them to trigger unauthorized actions such as the plugin's own post-submission hooks and potentially other plugins' REST endpoints.

AI-Powered Analysis

AILast updated: 11/26/2025, 08:07:56 UTC

Technical Analysis

CVE-2025-12535 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the SureForms plugin for WordPress, which is widely used for creating contact forms, custom forms, calculators, and more. The root cause lies in the plugin’s distribution of generic WordPress REST API nonces (wp_rest) to unauthenticated users through the 'wp_ajax_nopriv_rest-nonce' action. Normally, nonces are used to verify that requests originate from legitimate users to prevent CSRF attacks. However, SureForms incorrectly uses generic REST nonces rather than form-specific nonces, which are unique and tied to particular actions or forms. This design flaw allows unauthenticated attackers to bypass CSRF protections on REST API endpoints that rely solely on nonce verification without additional authentication or authorization checks. Consequently, attackers can invoke unauthorized actions such as triggering the plugin’s post-submission hooks, which may lead to unintended data processing or manipulation. Furthermore, because the vulnerability affects REST endpoints, it could potentially be leveraged to interact with other plugins that rely on similar nonce-based protections, broadening the attack surface. The vulnerability affects all versions up to and including 1.13.1. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. No public exploits have been reported yet, but the vulnerability’s presence in a popular WordPress plugin makes it a notable risk. The issue was publicly disclosed on November 19, 2025, with no patch links currently available, indicating that users should monitor vendor updates closely.

Potential Impact

For European organizations, this vulnerability primarily threatens the integrity of web applications using the SureForms plugin on WordPress. Attackers can perform unauthorized actions such as submitting or manipulating form data without user consent, potentially leading to data corruption, unauthorized workflows, or triggering unintended business processes. While it does not directly expose sensitive data or cause service outages, the ability to bypass CSRF protections can facilitate further chained attacks or abuse of application logic. Organizations relying on forms for customer interactions, lead generation, or internal workflows may experience operational disruptions or reputational damage if attackers exploit this flaw. Additionally, if other plugins on the same WordPress instance rely on similar nonce-based REST API protections, the vulnerability could be leveraged to escalate impact. Given the widespread use of WordPress in Europe, especially among small and medium enterprises and public sector websites, the risk is significant. Attackers could exploit this vulnerability remotely without authentication or user interaction, increasing the likelihood of automated or large-scale exploitation attempts once a public exploit emerges.

Mitigation Recommendations

1. Monitor the vendor’s official channels for patches addressing CVE-2025-12535 and apply updates promptly once available. 2. Until a patch is released, implement server-side validation to enforce form-specific nonces rather than generic REST API nonces. This can be done by customizing nonce verification logic to ensure that nonces are unique per form and action. 3. Restrict REST API endpoint access where possible, limiting unauthenticated access to only necessary endpoints. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious REST API requests that may indicate CSRF attempts. 5. Conduct thorough security reviews of other plugins that rely on nonce-based REST API protections to ensure they do not share similar weaknesses. 6. Educate developers and administrators about the risks of generic nonce usage and encourage best practices in nonce implementation. 7. Implement monitoring and alerting for unusual form submission patterns or REST API activity that could indicate exploitation attempts. 8. Consider disabling or replacing the SureForms plugin with alternatives that follow secure nonce handling if immediate patching is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-30T19:51:09.849Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691d6a73a27e6d5e91bd8394

Added to database: 11/19/2025, 6:57:55 AM

Last enriched: 11/26/2025, 8:07:56 AM

Last updated: 1/7/2026, 4:19:15 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats