Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13722: CWE-862 Missing Authorization in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder

0
Medium
VulnerabilityCVE-2025-13722cvecve-2025-13722cwe-862
Published: Wed Jan 07 2026 (01/07/2026, 09:21:06 UTC)
Source: CVE Database V5
Vendor/Project: techjewel
Product: Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder

Description

The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.1.7. This is due to missing capability checks on the `fluentform_ai_create_form` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary forms via the publicly exposed AI builder.

AI-Powered Analysis

AILast updated: 01/07/2026, 12:08:18 UTC

Technical Analysis

CVE-2025-13722 is a vulnerability identified in the WordPress plugin 'Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder' developed by techjewel. The issue arises from missing authorization checks on the AJAX action 'fluentform_ai_create_form', which is part of the plugin's AI-powered form builder feature. This flaw allows any authenticated user with at least Subscriber-level privileges to create arbitrary forms on the affected WordPress site without proper capability validation. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to enforce proper access controls before allowing sensitive operations. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the vulnerability is remotely exploitable over the network without user interaction and requires only low privileges (authenticated Subscriber). The impact primarily affects the integrity of the website by enabling unauthorized form creation, which could be leveraged for social engineering, phishing, or injecting malicious content. There is no direct impact on confidentiality or availability. No public exploits or active exploitation in the wild have been reported as of the publication date. The vulnerability affects all versions of the plugin up to and including 6.1.7. Since no patch links are provided, users should monitor vendor advisories for updates. The flaw highlights the importance of enforcing strict capability checks on AJAX endpoints, especially those exposed publicly or to authenticated users with limited privileges.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity of their WordPress-based websites that utilize the Fluent Forms plugin. Unauthorized form creation can be exploited to deploy phishing forms, collect sensitive user data under false pretenses, or inject misleading content, potentially damaging brand reputation and user trust. While it does not directly expose confidential data or disrupt service availability, the ability to create arbitrary forms can facilitate social engineering attacks or be a foothold for further compromise. Organizations in sectors such as e-commerce, government, education, and healthcare that rely on WordPress forms for user interaction are particularly at risk. Additionally, regulatory frameworks like GDPR impose strict requirements on data protection and user consent, so misuse of forms could lead to compliance violations and fines. The lack of known exploits in the wild reduces immediate urgency but does not eliminate the risk, as attackers may develop exploits given the public disclosure.

Mitigation Recommendations

1. Monitor the official plugin vendor channels for security patches addressing CVE-2025-13722 and apply updates promptly once available. 2. Until a patch is released, restrict access to the WordPress backend by limiting Subscriber-level user creation and reviewing existing user roles to ensure minimal privileges. 3. Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting 'fluentform_ai_create_form'. 4. Audit and monitor form creation logs regularly to identify unauthorized or unusual form creation activities. 5. Consider disabling or restricting the AI builder feature if it is not essential to reduce the attack surface. 6. Employ multi-factor authentication (MFA) for all authenticated users to reduce the risk of compromised credentials being used to exploit this vulnerability. 7. Educate site administrators and users about the risks of unauthorized form creation and phishing attempts. 8. Conduct regular security assessments and penetration testing focusing on WordPress plugins and their access controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T22:21:02.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e4c107349d0379d7d5664

Added to database: 1/7/2026, 12:05:36 PM

Last enriched: 1/7/2026, 12:08:18 PM

Last updated: 1/8/2026, 9:50:22 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats