CVE-2025-13722: CWE-862 Missing Authorization in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.1.7. This is due to missing capability checks on the `fluentform_ai_create_form` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary forms via the publicly exposed AI builder.
AI Analysis
Technical Summary
CVE-2025-13722 is a vulnerability identified in the WordPress plugin 'Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder' developed by techjewel. The issue arises from missing authorization checks on the AJAX action 'fluentform_ai_create_form', which is part of the plugin's AI-powered form builder feature. This flaw allows any authenticated user with at least Subscriber-level privileges to create arbitrary forms on the affected WordPress site without proper capability validation. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to enforce proper access controls before allowing sensitive operations. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the vulnerability is remotely exploitable over the network without user interaction and requires only low privileges (authenticated Subscriber). The impact primarily affects the integrity of the website by enabling unauthorized form creation, which could be leveraged for social engineering, phishing, or injecting malicious content. There is no direct impact on confidentiality or availability. No public exploits or active exploitation in the wild have been reported as of the publication date. The vulnerability affects all versions of the plugin up to and including 6.1.7. Since no patch links are provided, users should monitor vendor advisories for updates. The flaw highlights the importance of enforcing strict capability checks on AJAX endpoints, especially those exposed publicly or to authenticated users with limited privileges.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of their WordPress-based websites that utilize the Fluent Forms plugin. Unauthorized form creation can be exploited to deploy phishing forms, collect sensitive user data under false pretenses, or inject misleading content, potentially damaging brand reputation and user trust. While it does not directly expose confidential data or disrupt service availability, the ability to create arbitrary forms can facilitate social engineering attacks or be a foothold for further compromise. Organizations in sectors such as e-commerce, government, education, and healthcare that rely on WordPress forms for user interaction are particularly at risk. Additionally, regulatory frameworks like GDPR impose strict requirements on data protection and user consent, so misuse of forms could lead to compliance violations and fines. The lack of known exploits in the wild reduces immediate urgency but does not eliminate the risk, as attackers may develop exploits given the public disclosure.
Mitigation Recommendations
1. Monitor the official plugin vendor channels for security patches addressing CVE-2025-13722 and apply updates promptly once available. 2. Until a patch is released, restrict access to the WordPress backend by limiting Subscriber-level user creation and reviewing existing user roles to ensure minimal privileges. 3. Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting 'fluentform_ai_create_form'. 4. Audit and monitor form creation logs regularly to identify unauthorized or unusual form creation activities. 5. Consider disabling or restricting the AI builder feature if it is not essential to reduce the attack surface. 6. Employ multi-factor authentication (MFA) for all authenticated users to reduce the risk of compromised credentials being used to exploit this vulnerability. 7. Educate site administrators and users about the risks of unauthorized form creation and phishing attempts. 8. Conduct regular security assessments and penetration testing focusing on WordPress plugins and their access controls.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-13722: CWE-862 Missing Authorization in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
Description
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.1.7. This is due to missing capability checks on the `fluentform_ai_create_form` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary forms via the publicly exposed AI builder.
AI-Powered Analysis
Technical Analysis
CVE-2025-13722 is a vulnerability identified in the WordPress plugin 'Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder' developed by techjewel. The issue arises from missing authorization checks on the AJAX action 'fluentform_ai_create_form', which is part of the plugin's AI-powered form builder feature. This flaw allows any authenticated user with at least Subscriber-level privileges to create arbitrary forms on the affected WordPress site without proper capability validation. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to enforce proper access controls before allowing sensitive operations. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the vulnerability is remotely exploitable over the network without user interaction and requires only low privileges (authenticated Subscriber). The impact primarily affects the integrity of the website by enabling unauthorized form creation, which could be leveraged for social engineering, phishing, or injecting malicious content. There is no direct impact on confidentiality or availability. No public exploits or active exploitation in the wild have been reported as of the publication date. The vulnerability affects all versions of the plugin up to and including 6.1.7. Since no patch links are provided, users should monitor vendor advisories for updates. The flaw highlights the importance of enforcing strict capability checks on AJAX endpoints, especially those exposed publicly or to authenticated users with limited privileges.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of their WordPress-based websites that utilize the Fluent Forms plugin. Unauthorized form creation can be exploited to deploy phishing forms, collect sensitive user data under false pretenses, or inject misleading content, potentially damaging brand reputation and user trust. While it does not directly expose confidential data or disrupt service availability, the ability to create arbitrary forms can facilitate social engineering attacks or be a foothold for further compromise. Organizations in sectors such as e-commerce, government, education, and healthcare that rely on WordPress forms for user interaction are particularly at risk. Additionally, regulatory frameworks like GDPR impose strict requirements on data protection and user consent, so misuse of forms could lead to compliance violations and fines. The lack of known exploits in the wild reduces immediate urgency but does not eliminate the risk, as attackers may develop exploits given the public disclosure.
Mitigation Recommendations
1. Monitor the official plugin vendor channels for security patches addressing CVE-2025-13722 and apply updates promptly once available. 2. Until a patch is released, restrict access to the WordPress backend by limiting Subscriber-level user creation and reviewing existing user roles to ensure minimal privileges. 3. Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting 'fluentform_ai_create_form'. 4. Audit and monitor form creation logs regularly to identify unauthorized or unusual form creation activities. 5. Consider disabling or restricting the AI builder feature if it is not essential to reduce the attack surface. 6. Employ multi-factor authentication (MFA) for all authenticated users to reduce the risk of compromised credentials being used to exploit this vulnerability. 7. Educate site administrators and users about the risks of unauthorized form creation and phishing attempts. 8. Conduct regular security assessments and penetration testing focusing on WordPress plugins and their access controls.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-25T22:21:02.440Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c107349d0379d7d5664
Added to database: 1/7/2026, 12:05:36 PM
Last enriched: 1/7/2026, 12:08:18 PM
Last updated: 1/8/2026, 9:50:22 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0729: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-14436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in neeraj_slit Brevo for WooCommerce
HighCVE-2025-68718: n/a
MediumCVE-2025-15464: CWE-926 Improper Export of Android Application Components in yintibao Fun Print Mobile
HighCVE-2025-14505: CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation in Elliptic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.