Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13140: CWE-352 Cross-Site Request Forgery (CSRF) in devsoftbaltic SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity

0
Medium
VulnerabilityCVE-2025-13140cvecve-2025-13140cwe-352
Published: Tue Dec 02 2025 (12/02/2025, 06:40:25 UTC)
Source: CVE Database V5
Vendor/Project: devsoftbaltic
Product: SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity

Description

The SurveyJS: Drag & Drop WordPress Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.12.20. This is due to missing nonce validation on the SurveyJS_DeleteSurvey AJAX action. This makes it possible for unauthenticated attackers to delete surveys via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/09/2025, 07:44:03 UTC

Technical Analysis

CVE-2025-13140 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the SurveyJS: Drag & Drop WordPress Form Builder plugin, versions up to and including 1.12.20. The root cause is the absence of nonce validation on the AJAX action SurveyJS_DeleteSurvey, which is responsible for deleting surveys. Nonces in WordPress are security tokens used to verify that requests are intentional and originate from authenticated users. Without nonce validation, an attacker can craft a malicious request that, if executed by an authenticated administrator (e.g., by clicking a link), will delete surveys without their consent. This vulnerability does not require the attacker to be authenticated, but it does require user interaction from an administrator, making social engineering a key exploitation vector. The impact is limited to the integrity of survey data, as attackers can delete surveys, potentially disrupting data collection and analysis. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting its medium severity due to the lack of confidentiality or availability impact and the need for user interaction. No patches or exploits are currently documented, but the issue is publicly disclosed and should be addressed promptly to prevent abuse. The plugin is used in WordPress environments to create and manage complex forms, making it a valuable target for attackers seeking to disrupt organizational data workflows.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential loss or tampering of survey data, which could affect decision-making processes, customer feedback analysis, and internal data collection efforts. Organizations relying on SurveyJS forms for critical business functions may experience operational disruption if surveys are deleted maliciously. While the vulnerability does not expose sensitive data directly, the integrity loss could undermine trust in data-driven processes. Additionally, successful exploitation could be part of a broader attack chain, where attackers use survey deletion as a distraction or to degrade service quality. The requirement for administrator interaction means that organizations with less rigorous security awareness training may be more vulnerable. Given the widespread use of WordPress in Europe, especially in sectors like education, public administration, and SMEs, the risk is non-trivial. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if they are using the affected versions of the SurveyJS plugin and update to a patched version once available. In the absence of an official patch, administrators or developers should implement nonce validation on the SurveyJS_DeleteSurvey AJAX action to ensure requests are legitimate. This involves adding WordPress nonce checks in the server-side code handling the AJAX request. Additionally, organizations should enhance administrator security awareness training to recognize and avoid phishing and social engineering attempts that could lead to clicking malicious links. Employing web application firewalls (WAFs) with rules to detect and block suspicious AJAX requests targeting the SurveyJS_DeleteSurvey action can provide an additional layer of defense. Regular backups of survey data should be maintained to enable recovery in case of deletion. Monitoring logs for unusual deletion activity can help detect exploitation attempts early. Finally, limiting administrative privileges to only necessary personnel reduces the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-13T18:51:13.288Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e8e125ae71122647f9691

Added to database: 12/2/2025, 6:58:26 AM

Last enriched: 12/9/2025, 7:44:03 AM

Last updated: 1/16/2026, 1:35:54 PM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats