CVE-2025-13722: CWE-862 Missing Authorization in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
CVE-2025-13722 is a medium-severity vulnerability in the WordPress plugin Fluent Forms, affecting all versions up to 6. 1. 7. It arises from missing authorization checks on the AJAX action 'fluentform_ai_create_form', allowing authenticated users with Subscriber-level access or higher to create arbitrary forms via the AI builder. Although this does not directly impact confidentiality or availability, it can lead to integrity issues by enabling unauthorized form creation, potentially facilitating phishing or social engineering attacks. Exploitation requires authentication but no special privileges beyond Subscriber level, and no user interaction beyond login is needed. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this vulnerability to prevent misuse. Countries with high WordPress adoption and significant use of this plugin, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. Mitigation includes restricting Subscriber permissions, monitoring form creation activity, and applying updates once available.
AI Analysis
Technical Summary
CVE-2025-13722 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder WordPress plugin developed by techjewel. The flaw exists in all versions up to and including 6.1.7 due to the absence of proper capability checks on the AJAX action 'fluentform_ai_create_form'. This action is publicly exposed and can be invoked by any authenticated user with at least Subscriber-level access, which is typically the lowest privilege level assigned to registered users on WordPress sites. Exploiting this vulnerability allows such users to create arbitrary forms through the plugin's AI form builder feature without proper authorization. While the vulnerability does not directly disclose sensitive data or disrupt service availability, it compromises the integrity of the website by enabling unauthorized content injection. Attackers could leverage this to create deceptive forms that facilitate phishing, data harvesting, or social engineering campaigns targeting site visitors or administrators. The CVSS v3.1 base score is 5.3 (medium severity), reflecting network exploitability, low attack complexity, no privileges required beyond authentication, and no user interaction needed. No patches or updates were linked at the time of publication, and no known exploits have been reported in the wild. The vulnerability was reserved in late 2025 and published in early 2026 by Wordfence, indicating recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of their WordPress-based websites that utilize the Fluent Forms plugin. Unauthorized form creation can be exploited to deploy malicious or fraudulent forms, potentially leading to phishing attacks against customers or employees, data collection abuse, or reputational damage. Although it does not directly compromise confidentiality or availability, the ability to inject arbitrary forms can facilitate further attacks or social engineering campaigns. Organizations in sectors with high reliance on customer interaction via web forms—such as e-commerce, finance, healthcare, and public services—may face elevated risks. Additionally, regulatory frameworks like GDPR impose strict requirements on data protection and user consent, so misuse of forms could result in compliance violations and fines. The medium severity score indicates a need for timely remediation, especially since exploitation requires only authenticated Subscriber-level access, which might be obtained through credential compromise or weak registration controls.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately audit user roles and permissions on WordPress sites to ensure that Subscriber-level accounts are tightly controlled and monitored; restrict account creation and enforce strong authentication mechanisms such as MFA. 2) Temporarily disable or restrict access to the AI form builder feature if possible until a patch is released. 3) Monitor logs and alerts for unusual form creation activities, especially from accounts with minimal privileges. 4) Apply principle of least privilege by reviewing and limiting the capabilities assigned to Subscriber and other low-level roles. 5) Stay informed about updates from the plugin vendor and apply security patches promptly once available. 6) Consider implementing web application firewalls (WAF) with custom rules to detect and block unauthorized AJAX requests related to 'fluentform_ai_create_form'. 7) Educate site administrators and users about the risks of unauthorized form creation and phishing attempts. These targeted actions go beyond generic advice by focusing on controlling authenticated user capabilities and monitoring specific plugin behavior.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-13722: CWE-862 Missing Authorization in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
Description
CVE-2025-13722 is a medium-severity vulnerability in the WordPress plugin Fluent Forms, affecting all versions up to 6. 1. 7. It arises from missing authorization checks on the AJAX action 'fluentform_ai_create_form', allowing authenticated users with Subscriber-level access or higher to create arbitrary forms via the AI builder. Although this does not directly impact confidentiality or availability, it can lead to integrity issues by enabling unauthorized form creation, potentially facilitating phishing or social engineering attacks. Exploitation requires authentication but no special privileges beyond Subscriber level, and no user interaction beyond login is needed. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this vulnerability to prevent misuse. Countries with high WordPress adoption and significant use of this plugin, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. Mitigation includes restricting Subscriber permissions, monitoring form creation activity, and applying updates once available.
AI-Powered Analysis
Technical Analysis
CVE-2025-13722 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder WordPress plugin developed by techjewel. The flaw exists in all versions up to and including 6.1.7 due to the absence of proper capability checks on the AJAX action 'fluentform_ai_create_form'. This action is publicly exposed and can be invoked by any authenticated user with at least Subscriber-level access, which is typically the lowest privilege level assigned to registered users on WordPress sites. Exploiting this vulnerability allows such users to create arbitrary forms through the plugin's AI form builder feature without proper authorization. While the vulnerability does not directly disclose sensitive data or disrupt service availability, it compromises the integrity of the website by enabling unauthorized content injection. Attackers could leverage this to create deceptive forms that facilitate phishing, data harvesting, or social engineering campaigns targeting site visitors or administrators. The CVSS v3.1 base score is 5.3 (medium severity), reflecting network exploitability, low attack complexity, no privileges required beyond authentication, and no user interaction needed. No patches or updates were linked at the time of publication, and no known exploits have been reported in the wild. The vulnerability was reserved in late 2025 and published in early 2026 by Wordfence, indicating recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of their WordPress-based websites that utilize the Fluent Forms plugin. Unauthorized form creation can be exploited to deploy malicious or fraudulent forms, potentially leading to phishing attacks against customers or employees, data collection abuse, or reputational damage. Although it does not directly compromise confidentiality or availability, the ability to inject arbitrary forms can facilitate further attacks or social engineering campaigns. Organizations in sectors with high reliance on customer interaction via web forms—such as e-commerce, finance, healthcare, and public services—may face elevated risks. Additionally, regulatory frameworks like GDPR impose strict requirements on data protection and user consent, so misuse of forms could result in compliance violations and fines. The medium severity score indicates a need for timely remediation, especially since exploitation requires only authenticated Subscriber-level access, which might be obtained through credential compromise or weak registration controls.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately audit user roles and permissions on WordPress sites to ensure that Subscriber-level accounts are tightly controlled and monitored; restrict account creation and enforce strong authentication mechanisms such as MFA. 2) Temporarily disable or restrict access to the AI form builder feature if possible until a patch is released. 3) Monitor logs and alerts for unusual form creation activities, especially from accounts with minimal privileges. 4) Apply principle of least privilege by reviewing and limiting the capabilities assigned to Subscriber and other low-level roles. 5) Stay informed about updates from the plugin vendor and apply security patches promptly once available. 6) Consider implementing web application firewalls (WAF) with custom rules to detect and block unauthorized AJAX requests related to 'fluentform_ai_create_form'. 7) Educate site administrators and users about the risks of unauthorized form creation and phishing attempts. These targeted actions go beyond generic advice by focusing on controlling authenticated user capabilities and monitoring specific plugin behavior.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-25T22:21:02.440Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c107349d0379d7d5664
Added to database: 1/7/2026, 12:05:36 PM
Last enriched: 1/14/2026, 4:02:09 PM
Last updated: 2/5/2026, 6:36:07 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15080: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-R Series R08PCPU
HighCVE-2025-61732: CWE-94: Improper Control of Generation of Code ('Code Injection') in Go toolchain cmd/cgo
HighCVE-2025-10314: CWE-276 Incorrect Default Permissions in Mitsubishi Electric Corporation FREQSHIP-mini for Windows
HighCVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.