CVE-2025-13205: CWE-352 Cross-Site Request Forgery (CSRF) in devsoftbaltic SurveyJS: Drag & Drop Form Builder
CVE-2025-13205 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting the SurveyJS: Drag & Drop Form Builder WordPress plugin up to version 1. 12. 20. The flaw arises from missing or incorrect nonce validation on the AJAX action 'SurveyJS_CloneSurvey', allowing unauthenticated attackers to trick site administrators into duplicating surveys via forged requests. Exploitation requires user interaction, specifically the administrator clicking a malicious link. While no known exploits are currently reported in the wild, successful attacks could lead to unauthorized survey duplication, potentially impacting data integrity and site management. The vulnerability does not affect confidentiality or availability directly. European organizations using this plugin on WordPress sites are at risk, especially those with administrators who might be targeted via phishing or social engineering. Mitigation involves applying patches when available, implementing proper nonce validation, and educating administrators about phishing risks. Countries with high WordPress adoption and significant use of this plugin, such as Germany, the UK, France, and the Netherlands, are more likely to be affected.
AI Analysis
Technical Summary
CVE-2025-13205 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the SurveyJS: Drag & Drop Form Builder plugin for WordPress, affecting all versions up to and including 1.12.20. The vulnerability stems from missing or incorrect nonce validation on the AJAX action 'SurveyJS_CloneSurvey', which is responsible for duplicating surveys. Nonce tokens in WordPress are security measures designed to verify that requests originate from legitimate users and not from malicious third parties. The absence or improper implementation of nonce validation allows an attacker to craft a malicious request that, when executed by an authenticated administrator (typically via clicking a specially crafted link), results in unauthorized duplication of surveys. This attack vector requires no prior authentication by the attacker but does require user interaction from a privileged user, making it a classic CSRF scenario. The impact is limited to integrity, as attackers can manipulate survey data by duplicating surveys without authorization. There is no direct impact on confidentiality or availability. The CVSS v3.1 score is 4.3 (medium), reflecting the low complexity of the attack but the requirement for user interaction and limited impact scope. No patches or official fixes have been linked yet, and no known exploits have been reported in the wild. The vulnerability affects the WordPress plugin ecosystem, which is widely used across Europe, particularly in small to medium enterprises and public sector organizations that rely on WordPress for content management and survey collection.
Potential Impact
For European organizations, the primary impact of CVE-2025-13205 lies in the potential unauthorized manipulation of survey data through duplication. While this does not directly compromise sensitive information or disrupt service availability, it can undermine data integrity and trustworthiness of survey results, which may be critical for decision-making processes, compliance reporting, or customer feedback analysis. Organizations relying on SurveyJS for collecting user input or feedback may face operational inefficiencies or reputational damage if attackers exploit this vulnerability to create misleading or redundant survey entries. Additionally, the attack requires tricking an administrator, which could be leveraged as part of a broader social engineering campaign targeting administrative users. This risk is heightened in sectors with high regulatory scrutiny or where survey data influences business or governmental decisions. The vulnerability's medium severity suggests it is not an immediate critical threat but should be addressed promptly to prevent potential exploitation.
Mitigation Recommendations
To mitigate CVE-2025-13205, organizations should first monitor for and apply any official patches or updates released by devsoftbaltic addressing nonce validation in the SurveyJS plugin. In the absence of patches, administrators can implement custom nonce verification on the 'SurveyJS_CloneSurvey' AJAX action by modifying plugin code or using WordPress hooks to enforce proper nonce checks. Additionally, organizations should restrict administrative access to trusted networks or VPNs to reduce exposure. User education is critical: administrators must be trained to recognize phishing attempts and avoid clicking suspicious links, especially those received via email or messaging platforms. Implementing Content Security Policy (CSP) headers and SameSite cookies can also help reduce CSRF risks by limiting cross-origin request capabilities. Regular audits of installed plugins and their versions should be conducted to identify vulnerable components. Finally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the vulnerable action.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-13205: CWE-352 Cross-Site Request Forgery (CSRF) in devsoftbaltic SurveyJS: Drag & Drop Form Builder
Description
CVE-2025-13205 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting the SurveyJS: Drag & Drop Form Builder WordPress plugin up to version 1. 12. 20. The flaw arises from missing or incorrect nonce validation on the AJAX action 'SurveyJS_CloneSurvey', allowing unauthenticated attackers to trick site administrators into duplicating surveys via forged requests. Exploitation requires user interaction, specifically the administrator clicking a malicious link. While no known exploits are currently reported in the wild, successful attacks could lead to unauthorized survey duplication, potentially impacting data integrity and site management. The vulnerability does not affect confidentiality or availability directly. European organizations using this plugin on WordPress sites are at risk, especially those with administrators who might be targeted via phishing or social engineering. Mitigation involves applying patches when available, implementing proper nonce validation, and educating administrators about phishing risks. Countries with high WordPress adoption and significant use of this plugin, such as Germany, the UK, France, and the Netherlands, are more likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-13205 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the SurveyJS: Drag & Drop Form Builder plugin for WordPress, affecting all versions up to and including 1.12.20. The vulnerability stems from missing or incorrect nonce validation on the AJAX action 'SurveyJS_CloneSurvey', which is responsible for duplicating surveys. Nonce tokens in WordPress are security measures designed to verify that requests originate from legitimate users and not from malicious third parties. The absence or improper implementation of nonce validation allows an attacker to craft a malicious request that, when executed by an authenticated administrator (typically via clicking a specially crafted link), results in unauthorized duplication of surveys. This attack vector requires no prior authentication by the attacker but does require user interaction from a privileged user, making it a classic CSRF scenario. The impact is limited to integrity, as attackers can manipulate survey data by duplicating surveys without authorization. There is no direct impact on confidentiality or availability. The CVSS v3.1 score is 4.3 (medium), reflecting the low complexity of the attack but the requirement for user interaction and limited impact scope. No patches or official fixes have been linked yet, and no known exploits have been reported in the wild. The vulnerability affects the WordPress plugin ecosystem, which is widely used across Europe, particularly in small to medium enterprises and public sector organizations that rely on WordPress for content management and survey collection.
Potential Impact
For European organizations, the primary impact of CVE-2025-13205 lies in the potential unauthorized manipulation of survey data through duplication. While this does not directly compromise sensitive information or disrupt service availability, it can undermine data integrity and trustworthiness of survey results, which may be critical for decision-making processes, compliance reporting, or customer feedback analysis. Organizations relying on SurveyJS for collecting user input or feedback may face operational inefficiencies or reputational damage if attackers exploit this vulnerability to create misleading or redundant survey entries. Additionally, the attack requires tricking an administrator, which could be leveraged as part of a broader social engineering campaign targeting administrative users. This risk is heightened in sectors with high regulatory scrutiny or where survey data influences business or governmental decisions. The vulnerability's medium severity suggests it is not an immediate critical threat but should be addressed promptly to prevent potential exploitation.
Mitigation Recommendations
To mitigate CVE-2025-13205, organizations should first monitor for and apply any official patches or updates released by devsoftbaltic addressing nonce validation in the SurveyJS plugin. In the absence of patches, administrators can implement custom nonce verification on the 'SurveyJS_CloneSurvey' AJAX action by modifying plugin code or using WordPress hooks to enforce proper nonce checks. Additionally, organizations should restrict administrative access to trusted networks or VPNs to reduce exposure. User education is critical: administrators must be trained to recognize phishing attempts and avoid clicking suspicious links, especially those received via email or messaging platforms. Implementing Content Security Policy (CSP) headers and SameSite cookies can also help reduce CSRF risks by limiting cross-origin request capabilities. Regular audits of installed plugins and their versions should be conducted to identify vulnerable components. Finally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the vulnerable action.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-14T17:24:30.640Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69748ef84623b1157cac2e71
Added to database: 1/24/2026, 9:20:56 AM
Last enriched: 1/24/2026, 9:36:16 AM
Last updated: 1/24/2026, 2:01:35 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0911: CWE-434 Unrestricted Upload of File with Dangerous Type in wpmudev Hustle – Email Marketing, Lead Generation, Optins, Popups
HighCVE-2025-13920: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wpdirectorykit WP Directory Kit
MediumCVE-2026-1300: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mehtevas Responsive Header Plugin
MediumCVE-2026-1208: CWE-352 Cross-Site Request Forgery (CSRF) in mainichiweb Friendly Functions for Welcart
MediumCVE-2026-1191: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in freemp JavaScript Notifier
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.