CVE-2025-4659: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in crmperks Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms
The Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.4.4. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
AI Analysis
Technical Summary
CVE-2025-4659 is a vulnerability identified in the crmperks Integration plugin for Salesforce and popular WordPress form plugins including Contact Form 7, WPForms, Elementor, Formidable, and Ninja Forms. The vulnerability is a Full Path Disclosure (CWE-200) affecting all versions up to and including 1.4.4. It allows unauthenticated attackers to retrieve the full filesystem path of the web application by exploiting improper error handling or information leakage in the plugin’s code. This disclosure does not directly expose sensitive data such as credentials or user information but reveals the directory structure and installation paths. Such information can be leveraged by attackers to facilitate further attacks, such as local file inclusion, remote code execution, or privilege escalation, especially if other vulnerabilities exist in the environment. The vulnerability requires no privileges or user interaction, making it easily exploitable remotely. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning it is network exploitable with low attack complexity, no privileges required, no user interaction, and only impacts confidentiality minimally. No patches or fixes were listed at the time of publication, and no known exploits have been observed in the wild. The vulnerability was published on May 30, 2025, and was assigned by Wordfence. It is important to note that the disclosed information alone is not sufficient to compromise a system but can be a critical enabler for chained attacks.
Potential Impact
The primary impact of CVE-2025-4659 is the exposure of the full filesystem path of the web application to unauthenticated attackers. While this does not directly compromise sensitive data or system integrity, it significantly aids attackers in reconnaissance and crafting targeted exploits. Knowledge of the full path can help attackers identify the environment, locate configuration files, or exploit other vulnerabilities such as local file inclusion or directory traversal. For organizations, this increases the risk of successful exploitation of chained vulnerabilities leading to data breaches, unauthorized access, or service disruption. The vulnerability affects all installations of the crmperks Integration plugin up to version 1.4.4, which is widely used in WordPress sites integrating Salesforce and popular form plugins. Given WordPress’s large market share and the popularity of Salesforce integrations, many organizations worldwide could be exposed. However, the impact remains medium since exploitation alone does not cause direct damage without additional vulnerabilities. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks. Organizations with sensitive data or critical operations relying on these plugins should consider this vulnerability a significant security concern.
Mitigation Recommendations
To mitigate CVE-2025-4659, organizations should first verify if they are using the affected crmperks Integration plugin for Salesforce and the specified WordPress form plugins. Immediate steps include: 1) Updating the plugin to a version beyond 1.4.4 once a patch is released by the vendor; 2) If no patch is available, temporarily disabling the plugin or restricting access to the plugin’s files and error messages via web server configuration to prevent information leakage; 3) Implementing Web Application Firewalls (WAFs) with rules to detect and block attempts to exploit path disclosure vulnerabilities; 4) Conducting comprehensive security assessments to identify and remediate any other vulnerabilities that could be chained with this disclosure; 5) Limiting publicly accessible debug or error messages on the website; 6) Monitoring logs for suspicious requests that attempt to access sensitive paths or trigger errors; 7) Employing least privilege principles for WordPress file permissions to reduce exposure; 8) Educating development and operations teams about the risks of information disclosure and secure coding practices. These targeted actions go beyond generic advice by focusing on immediate containment and reducing the attack surface while awaiting official patches.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands, South Africa, Singapore
CVE-2025-4659: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in crmperks Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms
Description
The Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.4.4. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-4659 is a vulnerability identified in the crmperks Integration plugin for Salesforce and popular WordPress form plugins including Contact Form 7, WPForms, Elementor, Formidable, and Ninja Forms. The vulnerability is a Full Path Disclosure (CWE-200) affecting all versions up to and including 1.4.4. It allows unauthenticated attackers to retrieve the full filesystem path of the web application by exploiting improper error handling or information leakage in the plugin’s code. This disclosure does not directly expose sensitive data such as credentials or user information but reveals the directory structure and installation paths. Such information can be leveraged by attackers to facilitate further attacks, such as local file inclusion, remote code execution, or privilege escalation, especially if other vulnerabilities exist in the environment. The vulnerability requires no privileges or user interaction, making it easily exploitable remotely. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning it is network exploitable with low attack complexity, no privileges required, no user interaction, and only impacts confidentiality minimally. No patches or fixes were listed at the time of publication, and no known exploits have been observed in the wild. The vulnerability was published on May 30, 2025, and was assigned by Wordfence. It is important to note that the disclosed information alone is not sufficient to compromise a system but can be a critical enabler for chained attacks.
Potential Impact
The primary impact of CVE-2025-4659 is the exposure of the full filesystem path of the web application to unauthenticated attackers. While this does not directly compromise sensitive data or system integrity, it significantly aids attackers in reconnaissance and crafting targeted exploits. Knowledge of the full path can help attackers identify the environment, locate configuration files, or exploit other vulnerabilities such as local file inclusion or directory traversal. For organizations, this increases the risk of successful exploitation of chained vulnerabilities leading to data breaches, unauthorized access, or service disruption. The vulnerability affects all installations of the crmperks Integration plugin up to version 1.4.4, which is widely used in WordPress sites integrating Salesforce and popular form plugins. Given WordPress’s large market share and the popularity of Salesforce integrations, many organizations worldwide could be exposed. However, the impact remains medium since exploitation alone does not cause direct damage without additional vulnerabilities. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks. Organizations with sensitive data or critical operations relying on these plugins should consider this vulnerability a significant security concern.
Mitigation Recommendations
To mitigate CVE-2025-4659, organizations should first verify if they are using the affected crmperks Integration plugin for Salesforce and the specified WordPress form plugins. Immediate steps include: 1) Updating the plugin to a version beyond 1.4.4 once a patch is released by the vendor; 2) If no patch is available, temporarily disabling the plugin or restricting access to the plugin’s files and error messages via web server configuration to prevent information leakage; 3) Implementing Web Application Firewalls (WAFs) with rules to detect and block attempts to exploit path disclosure vulnerabilities; 4) Conducting comprehensive security assessments to identify and remediate any other vulnerabilities that could be chained with this disclosure; 5) Limiting publicly accessible debug or error messages on the website; 6) Monitoring logs for suspicious requests that attempt to access sensitive paths or trigger errors; 7) Employing least privilege principles for WordPress file permissions to reduce exposure; 8) Educating development and operations teams about the risks of information disclosure and secure coding practices. These targeted actions go beyond generic advice by focusing on immediate containment and reducing the attack surface while awaiting official patches.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-13T16:45:45.792Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839459a182aa0cae2a0e219
Added to database: 5/30/2025, 5:43:54 AM
Last enriched: 2/27/2026, 2:45:52 PM
Last updated: 3/22/2026, 8:49:54 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.