Skip to main content

CVE-2025-4659: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in crmperks Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms

Medium
VulnerabilityCVE-2025-4659cvecve-2025-4659cwe-200
Published: Fri May 30 2025 (05/30/2025, 05:23:20 UTC)
Source: CVE Database V5
Vendor/Project: crmperks
Product: Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms

Description

The Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.4.4. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.

AI-Powered Analysis

AILast updated: 07/07/2025, 21:56:24 UTC

Technical Analysis

CVE-2025-4659 is a vulnerability classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. It affects the WordPress plugin 'Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms' developed by crmperks. The vulnerability exists in all versions up to and including 1.4.4. Specifically, it is a Full Path Disclosure (FPD) vulnerability, which allows unauthenticated attackers to retrieve the full filesystem path of the web application hosting the plugin. This information leakage occurs without requiring any authentication or user interaction, making it accessible to any remote attacker scanning for vulnerable sites. The disclosed full path information, while not directly harmful on its own, can be leveraged to facilitate further attacks such as local file inclusion (LFI), remote code execution (RCE), or privilege escalation if combined with other vulnerabilities present in the target environment. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the low impact on confidentiality (only path disclosure), no impact on integrity or availability, and ease of exploitation (network accessible, no privileges or user interaction required). No known exploits are currently reported in the wild, and no patches or updates have been linked yet. The vulnerability affects a widely used integration plugin that connects Salesforce with popular WordPress form builders, which are commonly deployed in business and enterprise websites to streamline customer relationship management and lead capture workflows.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily as an enabler for more severe attacks. Organizations using WordPress sites with the affected crmperks integration plugin could inadvertently expose internal directory structures, which may reveal sensitive configuration details or deployment environments. While the direct impact is limited to information disclosure, attackers can use this data to tailor subsequent attacks, increasing the likelihood of successful exploitation of other vulnerabilities. This is particularly concerning for organizations handling sensitive customer data or regulated information under GDPR, as any compromise could lead to data breaches and regulatory penalties. Additionally, many European enterprises rely on Salesforce integrations for critical business processes; thus, exploitation could disrupt CRM workflows or lead to unauthorized access if chained with other vulnerabilities. The absence of authentication requirements and the network-exposed nature of the vulnerability increase the attack surface. However, since no known exploits are currently active, the immediate threat level is moderate but warrants proactive mitigation to prevent potential escalation.

Mitigation Recommendations

European organizations should take the following specific actions: 1) Immediately inventory all WordPress sites to identify installations of the crmperks Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms plugin. 2) Monitor official vendor channels and WordPress plugin repositories for patches or updates addressing CVE-2025-4659 and apply them promptly once available. 3) Implement Web Application Firewall (WAF) rules to detect and block requests attempting to trigger full path disclosure or suspicious error messages that reveal filesystem paths. 4) Harden WordPress error handling by disabling detailed error messages and stack traces in production environments to minimize information leakage. 5) Conduct regular vulnerability scanning and penetration testing focusing on chained exploits that could leverage path disclosure to escalate privileges or execute code. 6) Restrict access to WordPress admin and plugin directories via IP whitelisting or VPN where feasible to reduce exposure. 7) Educate site administrators about the risks of information disclosure and the importance of timely patching and secure configuration. These targeted steps go beyond generic advice by focusing on detection, containment, and preparation for potential exploit chaining.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-13T16:45:45.792Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839459a182aa0cae2a0e219

Added to database: 5/30/2025, 5:43:54 AM

Last enriched: 7/7/2025, 9:56:24 PM

Last updated: 8/18/2025, 11:53:46 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats