CVE-2025-13722: CWE-862 Missing Authorization in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.1.7. This is due to missing capability checks on the `fluentform_ai_create_form` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary forms via the publicly exposed AI builder.
AI Analysis
Technical Summary
CVE-2025-13722 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder' by techjewel. The issue exists in all versions up to and including 6.1.7 due to the absence of proper capability checks on the AJAX action 'fluentform_ai_create_form'. This AJAX endpoint is publicly exposed and allows authenticated users with minimal privileges (Subscriber-level or higher) to create arbitrary forms using the plugin’s AI builder functionality. Because the plugin fails to verify whether the user has the appropriate permissions before processing this request, attackers can abuse this to inject unauthorized forms into the system. While this does not directly expose sensitive data or disrupt service availability, it compromises the integrity of the website by allowing unauthorized content creation, which could be leveraged for phishing, spam, or other malicious activities. The vulnerability requires the attacker to be authenticated, but no further user interaction is necessary. No known public exploits or patches are currently available, but the flaw has been officially published and assigned a CVSS 3.1 base score of 5.3, indicating medium severity. The vulnerability affects a widely used WordPress plugin, making it a relevant concern for many organizations relying on WordPress for their web presence.
Potential Impact
The primary impact of CVE-2025-13722 is on the integrity of affected WordPress sites using the Fluent Forms plugin. Attackers with Subscriber-level access can create arbitrary forms, potentially enabling phishing campaigns, spam distribution, or embedding malicious content that could deceive users or administrators. Although confidentiality and availability are not directly compromised, the unauthorized form creation can lead to reputational damage, user trust erosion, and indirect security risks if malicious forms collect sensitive data or redirect users to harmful sites. Organizations with multi-user WordPress environments where low-privileged users have access are particularly vulnerable. The lack of authorization checks means that even users with minimal privileges can escalate their influence on the site’s content. This can also complicate incident response and forensic investigations due to unauthorized content injection. The absence of known exploits in the wild reduces immediate risk but does not preclude future exploitation, especially as the vulnerability is publicly documented.
Mitigation Recommendations
To mitigate CVE-2025-13722 effectively, organizations should: 1) Immediately restrict Subscriber-level and other low-privileged user roles from accessing or interacting with the Fluent Forms AI builder functionality, if possible, through role management or custom capability restrictions. 2) Monitor and audit form creation activities within WordPress to detect unauthorized or suspicious form additions promptly. 3) Apply principle of least privilege rigorously, ensuring users only have the minimum necessary permissions. 4) Implement web application firewalls (WAFs) with custom rules to detect and block unauthorized AJAX requests targeting 'fluentform_ai_create_form'. 5) Stay alert for official patches or updates from techjewel and apply them promptly once available. 6) Consider temporarily disabling the Fluent Forms plugin or the AI builder feature if the risk is unacceptable and no patch is available. 7) Educate site administrators and users about the risks of unauthorized form creation and encourage vigilance for unusual site behavior. These steps go beyond generic advice by focusing on access control, monitoring, and proactive defense tailored to the plugin’s specific vulnerability.
Affected Countries
United States, India, Germany, United Kingdom, Canada, Australia, Brazil, France, Netherlands, Italy
CVE-2025-13722: CWE-862 Missing Authorization in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
Description
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.1.7. This is due to missing capability checks on the `fluentform_ai_create_form` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary forms via the publicly exposed AI builder.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13722 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder' by techjewel. The issue exists in all versions up to and including 6.1.7 due to the absence of proper capability checks on the AJAX action 'fluentform_ai_create_form'. This AJAX endpoint is publicly exposed and allows authenticated users with minimal privileges (Subscriber-level or higher) to create arbitrary forms using the plugin’s AI builder functionality. Because the plugin fails to verify whether the user has the appropriate permissions before processing this request, attackers can abuse this to inject unauthorized forms into the system. While this does not directly expose sensitive data or disrupt service availability, it compromises the integrity of the website by allowing unauthorized content creation, which could be leveraged for phishing, spam, or other malicious activities. The vulnerability requires the attacker to be authenticated, but no further user interaction is necessary. No known public exploits or patches are currently available, but the flaw has been officially published and assigned a CVSS 3.1 base score of 5.3, indicating medium severity. The vulnerability affects a widely used WordPress plugin, making it a relevant concern for many organizations relying on WordPress for their web presence.
Potential Impact
The primary impact of CVE-2025-13722 is on the integrity of affected WordPress sites using the Fluent Forms plugin. Attackers with Subscriber-level access can create arbitrary forms, potentially enabling phishing campaigns, spam distribution, or embedding malicious content that could deceive users or administrators. Although confidentiality and availability are not directly compromised, the unauthorized form creation can lead to reputational damage, user trust erosion, and indirect security risks if malicious forms collect sensitive data or redirect users to harmful sites. Organizations with multi-user WordPress environments where low-privileged users have access are particularly vulnerable. The lack of authorization checks means that even users with minimal privileges can escalate their influence on the site’s content. This can also complicate incident response and forensic investigations due to unauthorized content injection. The absence of known exploits in the wild reduces immediate risk but does not preclude future exploitation, especially as the vulnerability is publicly documented.
Mitigation Recommendations
To mitigate CVE-2025-13722 effectively, organizations should: 1) Immediately restrict Subscriber-level and other low-privileged user roles from accessing or interacting with the Fluent Forms AI builder functionality, if possible, through role management or custom capability restrictions. 2) Monitor and audit form creation activities within WordPress to detect unauthorized or suspicious form additions promptly. 3) Apply principle of least privilege rigorously, ensuring users only have the minimum necessary permissions. 4) Implement web application firewalls (WAFs) with custom rules to detect and block unauthorized AJAX requests targeting 'fluentform_ai_create_form'. 5) Stay alert for official patches or updates from techjewel and apply them promptly once available. 6) Consider temporarily disabling the Fluent Forms plugin or the AI builder feature if the risk is unacceptable and no patch is available. 7) Educate site administrators and users about the risks of unauthorized form creation and encourage vigilance for unusual site behavior. These steps go beyond generic advice by focusing on access control, monitoring, and proactive defense tailored to the plugin’s specific vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-25T22:21:02.440Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c107349d0379d7d5664
Added to database: 1/7/2026, 12:05:36 PM
Last enriched: 2/27/2026, 10:13:33 AM
Last updated: 3/24/2026, 7:29:58 PM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.