Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14901: CWE-862 Missing Authorization in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational Form & Payment Form builder

0
Medium
VulnerabilityCVE-2025-14901cvecve-2025-14901cwe-862
Published: Wed Jan 07 2026 (01/07/2026, 06:35:57 UTC)
Source: CVE Database V5
Vendor/Project: bitpressadmin
Product: Bit Form – Custom Contact Form, Multi Step, Conversational Form & Payment Form builder

Description

CVE-2025-14901 is a medium severity vulnerability in the Bit Form WordPress plugin that allows unauthenticated attackers to trigger workflows without proper authorization. The flaw lies in the nonce verification logic, which only blocks requests when both the nonce check fails and the user is logged in, enabling replay attacks if attackers obtain valid entry and log IDs. Exploitation can lead to unauthorized execution of configured integrations such as webhooks, email notifications, CRM systems, and automation platforms. No authentication or user interaction is required, and the vulnerability affects all versions up to 2. 21. 6. While no known exploits are currently reported in the wild, the potential for abuse exists, especially in environments relying heavily on automated workflows. European organizations using this plugin on WordPress sites are at risk of integrity and availability impacts. Mitigation involves updating the plugin once a patch is available or implementing strict access controls and monitoring for suspicious AJAX requests. Countries with high WordPress usage and significant e-commerce or CRM integration adoption, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/14/2026, 15:47:40 UTC

Technical Analysis

CVE-2025-14901 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Bit Form – Custom Contact Form, Multi Step, Conversational Form & Payment Form builder plugin for WordPress, developed by bitpressadmin. The vulnerability arises from a logic flaw in the nonce verification within the triggerWorkFlow function. Specifically, the security check only blocks requests when both the nonce verification fails and the user is logged in. This incorrect logic allows unauthenticated attackers to bypass authorization controls by replaying form workflow executions. To exploit this vulnerability, an attacker must obtain the entry ID and log IDs from a legitimate form submission response, which can then be used to invoke the bitforms_trigger_workflow AJAX action. Successful exploitation enables the attacker to trigger all configured integrations tied to the form workflows, including webhooks, email notifications, CRM integrations, and automation platforms. This can lead to unauthorized actions being performed, potentially disrupting business processes or leaking information indirectly through triggered workflows. The vulnerability affects all versions of the plugin up to and including 2.21.6. The CVSS v3.1 base score is 6.5, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). No known exploits have been reported in the wild as of the published date. The flaw highlights the importance of proper authorization checks in AJAX actions and nonce verification logic in WordPress plugins that handle sensitive workflows.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity and availability of automated workflows integrated with the Bit Form plugin. Attackers can trigger unauthorized workflows that may send fraudulent emails, manipulate CRM data, or activate automation platforms, potentially causing business disruption, reputational damage, or indirect data leakage. Organizations relying on these workflows for customer interaction, payment processing, or internal automation could face operational interruptions or fraudulent activities. Since no authentication or user interaction is required, the attack surface is broad, increasing the likelihood of exploitation if attackers can obtain valid entry and log IDs. This is particularly concerning for sectors with high reliance on WordPress-based customer engagement tools, such as e-commerce, finance, and public services. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known. The medium severity rating reflects moderate impact potential, but the ease of exploitation and scope of affected systems warrant proactive mitigation.

Mitigation Recommendations

1. Monitor the vendor's official channels for a security patch and apply updates to the Bit Form plugin immediately upon release. 2. Until a patch is available, restrict access to the bitforms_trigger_workflow AJAX action by implementing server-side access controls, such as IP whitelisting or requiring authentication for AJAX requests. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests that attempt to trigger workflows without proper authorization. 4. Audit and limit the exposure of entry IDs and log IDs in form submission responses to prevent attackers from obtaining these identifiers. 5. Review and harden integration endpoints (webhooks, CRM, email systems) to validate incoming requests and reject unauthorized triggers. 6. Enable detailed logging and monitoring of workflow executions to detect anomalous or unexpected activity promptly. 7. Educate development and security teams on secure nonce verification and authorization best practices for WordPress plugins to prevent similar issues in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-18T16:33:20.699Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e0293a55ed4ed9984d557

Added to database: 1/7/2026, 6:52:03 AM

Last enriched: 1/14/2026, 3:47:40 PM

Last updated: 2/6/2026, 2:14:48 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats