Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3479: CWE-354 Improper Validation of Integrity Check Value in wpmudev Forminator Forms – Contact Form, Payment Form & Custom Form Builder

0
Medium
VulnerabilityCVE-2025-3479cvecve-2025-3479cwe-354
Published: Thu Apr 17 2025 (04/17/2025, 11:13:06 UTC)
Source: CVE Database V5
Vendor/Project: wpmudev
Product: Forminator Forms – Contact Form, Payment Form & Custom Form Builder

Description

CVE-2025-3479 is a medium-severity vulnerability in the Forminator Forms WordPress plugin that allows unauthenticated attackers to perform an order replay attack by reusing a single Stripe PaymentIntent for multiple transactions. Although only the first transaction is processed by Stripe, the plugin sends a successful confirmation email for each replayed transaction, potentially misleading administrators into fulfilling multiple orders fraudulently. This vulnerability arises from improper validation of an integrity check value in the 'handle_stripe_single' function, classified under CWE-354. No authentication or user interaction is required to exploit this flaw, and it affects all versions up to and including 1. 42. 0. There are no known exploits in the wild yet, and no patches have been released at the time of publication. Organizations using this plugin for payment processing should be aware of the risk of financial loss and reputational damage due to fraudulent order fulfillment.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:35:17 UTC

Technical Analysis

The vulnerability identified as CVE-2025-3479 affects the Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress, specifically versions up to 1.42.0. The root cause is an improper validation of an integrity check value (CWE-354) in the 'handle_stripe_single' function, which handles Stripe PaymentIntent objects. Attackers can exploit this flaw by replaying a previously used Stripe PaymentIntent, causing the plugin to accept multiple transactions based on a single payment authorization. Stripe itself processes only the first transaction, preventing multiple charges, but the plugin erroneously sends a successful transaction email for each replayed order. This discrepancy can deceive site administrators into believing multiple payments were made, leading to fraudulent order fulfillment or service delivery. The attack requires no authentication or user interaction and can be executed remotely over the network. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting medium severity due to the lack of confidentiality or availability impact but a clear integrity impact. No patches or fixes have been published yet, and no known exploits have been detected in the wild. The issue highlights the importance of robust validation of payment-related data and integrity checks in e-commerce plugins to prevent replay and fraud attacks.

Potential Impact

The primary impact of this vulnerability is financial fraud and operational disruption for organizations using the affected Forminator Forms plugin for payment processing. Attackers can cause the system to send multiple successful payment confirmations for a single Stripe PaymentIntent, tricking administrators into fulfilling multiple orders without receiving corresponding payments. This can lead to direct financial losses, inventory depletion, and reputational damage due to fraudulent transactions. Additionally, the administrative overhead to detect and remediate fraudulent orders can be significant. Since the vulnerability does not affect confidentiality or availability, data breaches or service outages are unlikely. However, the integrity of transaction processing is compromised, which is critical for e-commerce and payment systems. Organizations relying on this plugin, especially those with high transaction volumes or limited manual verification processes, are at increased risk. The lack of authentication or user interaction required for exploitation increases the attack surface and ease of abuse.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their use of the Forminator Forms plugin and consider the following specific actions: 1) Temporarily disable payment processing via the Forminator plugin until a vendor patch is released. 2) Implement manual verification procedures for all payment confirmations received through the plugin to detect discrepancies between Stripe's actual processed payments and plugin-generated confirmations. 3) Monitor transaction logs for repeated use of the same Stripe PaymentIntent identifiers and flag suspicious activity. 4) Restrict access to the WordPress admin interface and form submission endpoints using web application firewalls (WAFs) and IP whitelisting to reduce exposure to unauthenticated attackers. 5) Engage with the plugin vendor (wpmudev) to obtain updates or patches addressing the integrity validation flaw as soon as they become available. 6) Consider alternative, more secure payment processing plugins or custom integrations that enforce strict validation of payment intents and confirmations. 7) Educate administrative staff about the potential for fraudulent order confirmations and establish procedures for cross-checking payment status directly with Stripe. These targeted measures go beyond generic advice by focusing on detection of replay attempts, restricting attack vectors, and compensating controls until a patch is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-09T19:48:06.225Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b2bb7ef31ef0b54ef6c

Added to database: 2/25/2026, 9:35:39 PM

Last enriched: 2/25/2026, 10:35:17 PM

Last updated: 2/26/2026, 7:08:32 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats