Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13722: CWE-862 Missing Authorization in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder

0
Medium
VulnerabilityCVE-2025-13722cvecve-2025-13722cwe-862
Published: Wed Jan 07 2026 (01/07/2026, 09:21:06 UTC)
Source: CVE Database V5
Vendor/Project: techjewel
Product: Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder

Description

The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.1.7. This is due to missing capability checks on the `fluentform_ai_create_form` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary forms via the publicly exposed AI builder.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 10:13:33 UTC

Technical Analysis

CVE-2025-13722 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder' by techjewel. The issue exists in all versions up to and including 6.1.7 due to the absence of proper capability checks on the AJAX action 'fluentform_ai_create_form'. This AJAX endpoint is publicly exposed and allows authenticated users with minimal privileges (Subscriber-level or higher) to create arbitrary forms using the plugin’s AI builder functionality. Because the plugin fails to verify whether the user has the appropriate permissions before processing this request, attackers can abuse this to inject unauthorized forms into the system. While this does not directly expose sensitive data or disrupt service availability, it compromises the integrity of the website by allowing unauthorized content creation, which could be leveraged for phishing, spam, or other malicious activities. The vulnerability requires the attacker to be authenticated, but no further user interaction is necessary. No known public exploits or patches are currently available, but the flaw has been officially published and assigned a CVSS 3.1 base score of 5.3, indicating medium severity. The vulnerability affects a widely used WordPress plugin, making it a relevant concern for many organizations relying on WordPress for their web presence.

Potential Impact

The primary impact of CVE-2025-13722 is on the integrity of affected WordPress sites using the Fluent Forms plugin. Attackers with Subscriber-level access can create arbitrary forms, potentially enabling phishing campaigns, spam distribution, or embedding malicious content that could deceive users or administrators. Although confidentiality and availability are not directly compromised, the unauthorized form creation can lead to reputational damage, user trust erosion, and indirect security risks if malicious forms collect sensitive data or redirect users to harmful sites. Organizations with multi-user WordPress environments where low-privileged users have access are particularly vulnerable. The lack of authorization checks means that even users with minimal privileges can escalate their influence on the site’s content. This can also complicate incident response and forensic investigations due to unauthorized content injection. The absence of known exploits in the wild reduces immediate risk but does not preclude future exploitation, especially as the vulnerability is publicly documented.

Mitigation Recommendations

To mitigate CVE-2025-13722 effectively, organizations should: 1) Immediately restrict Subscriber-level and other low-privileged user roles from accessing or interacting with the Fluent Forms AI builder functionality, if possible, through role management or custom capability restrictions. 2) Monitor and audit form creation activities within WordPress to detect unauthorized or suspicious form additions promptly. 3) Apply principle of least privilege rigorously, ensuring users only have the minimum necessary permissions. 4) Implement web application firewalls (WAFs) with custom rules to detect and block unauthorized AJAX requests targeting 'fluentform_ai_create_form'. 5) Stay alert for official patches or updates from techjewel and apply them promptly once available. 6) Consider temporarily disabling the Fluent Forms plugin or the AI builder feature if the risk is unacceptable and no patch is available. 7) Educate site administrators and users about the risks of unauthorized form creation and encourage vigilance for unusual site behavior. These steps go beyond generic advice by focusing on access control, monitoring, and proactive defense tailored to the plugin’s specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T22:21:02.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e4c107349d0379d7d5664

Added to database: 1/7/2026, 12:05:36 PM

Last enriched: 2/27/2026, 10:13:33 AM

Last updated: 3/25/2026, 1:24:21 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses