Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14901: CWE-862 Missing Authorization in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational Form & Payment Form builder

0
Medium
VulnerabilityCVE-2025-14901cvecve-2025-14901cwe-862
Published: Wed Jan 07 2026 (01/07/2026, 06:35:57 UTC)
Source: CVE Database V5
Vendor/Project: bitpressadmin
Product: Bit Form – Custom Contact Form, Multi Step, Conversational Form & Payment Form builder

Description

The Bit Form – Contact Form Plugin plugin for WordPress is vulnerable to unauthorized workflow execution due to missing authorization in the triggerWorkFlow function in all versions up to, and including, 2.21.6. This is due to a logic flaw in the nonce verification where the security check only blocks requests when both the nonce verification fails and the user is logged in. This makes it possible for unauthenticated attackers to replay form workflow executions and trigger all configured integrations including webhooks, email notifications, CRM integrations, and automation platforms via the bitforms_trigger_workflow AJAX action granted they can obtain the entry ID and log IDs from a legitimate form submission response.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:42:40 UTC

Technical Analysis

CVE-2025-14901 is a missing authorization vulnerability (CWE-862) in the Bit Form – Custom Contact Form, Multi Step, Conversational Form & Payment Form builder WordPress plugin by bitpressadmin. The vulnerability exists in the triggerWorkFlow function, which is responsible for executing configured workflows such as webhooks, email notifications, CRM integrations, and automation platform triggers. The root cause is a logic flaw in the nonce verification mechanism: the security check only blocks requests when both the nonce verification fails and the user is logged in. This means that if the nonce verification fails but the user is not logged in (i.e., unauthenticated), the request is not blocked. Consequently, an unauthenticated attacker who can obtain valid entry IDs and log IDs from legitimate form submission responses can replay these requests to trigger workflows arbitrarily. This can lead to unauthorized execution of actions configured in the workflows, potentially causing data manipulation, spamming via email notifications, or triggering unintended automation processes. The vulnerability affects all versions of the plugin up to and including 2.21.6. The CVSS 3.1 base score is 6.5 (medium), reflecting network attack vector, no privileges required, no user interaction, and impact limited to integrity and availability but not confidentiality. No public exploits are currently known, and no patches have been linked yet. The vulnerability was reserved in December 2025 and published in January 2026.

Potential Impact

The primary impact of CVE-2025-14901 is unauthorized workflow execution that can disrupt business processes and automation pipelines. Attackers can trigger email notifications, potentially leading to spam or phishing campaigns originating from the victim's infrastructure, damaging reputation and causing operational disruption. CRM integrations and automation platforms triggered without authorization may result in data corruption, unauthorized data transmission, or unintended actions in connected systems, affecting data integrity and availability. The ability to replay workflows without authentication increases the risk of persistent abuse. Organizations relying on this plugin for critical form processing or payment workflows may experience service interruptions or data inconsistencies. Although confidentiality is not directly impacted, the integrity and availability of business processes and automated communications are at risk. The vulnerability's exploitation could also serve as a foothold for further attacks if attackers leverage triggered workflows to inject malicious payloads or manipulate downstream systems.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict access to form submission responses to trusted users only, minimizing the risk of attackers obtaining valid entry and log IDs. 2) Monitor and log all AJAX requests to the bitforms_trigger_workflow action for unusual patterns or repeated replay attempts. 3) Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the vulnerable AJAX endpoint, especially those lacking valid authentication tokens or originating from suspicious IP addresses. 4) Temporarily disable or limit critical integrations (e.g., email notifications, CRM triggers) configured in workflows to reduce potential impact. 5) If feasible, replace the vulnerable plugin with alternative form builders that have no known authorization issues. 6) Educate site administrators about the risk and encourage prompt updates once a patch becomes available. 7) Review and tighten nonce verification logic in custom code or plugin forks to ensure authorization checks are properly enforced regardless of user login status.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-18T16:33:20.699Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e0293a55ed4ed9984d557

Added to database: 1/7/2026, 6:52:03 AM

Last enriched: 2/27/2026, 11:42:40 AM

Last updated: 3/26/2026, 10:23:52 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses