CVE-2025-54682: CWE-352 Cross-Site Request Forgery (CSRF) in CRM Perks Connector for Gravity Forms and Google Sheets
Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks Connector for Gravity Forms and Google Sheets allows Cross Site Request Forgery. This issue affects Connector for Gravity Forms and Google Sheets: from n/a through 1.2.4.
AI Analysis
Technical Summary
CVE-2025-54682 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the CRM Perks Connector for Gravity Forms and Google Sheets plugin, affecting versions up to 1.2.4. This plugin integrates Gravity Forms, a popular WordPress form builder, with Google Sheets, enabling automated data transfer from form submissions to spreadsheet documents. The vulnerability arises due to insufficient protection against CSRF attacks, which allow an attacker to trick an authenticated user into submitting unwanted requests to the web application without their consent. Specifically, an attacker could craft a malicious web page or link that, when visited by an authenticated user, causes the plugin to perform unintended actions such as modifying data or triggering processes within the Gravity Forms and Google Sheets integration. The CVSS v3.1 base score of 5.4 (medium severity) reflects that the vulnerability can be exploited remotely over the network without requiring privileges (AV:N/AC:L/PR:N), but does require user interaction (UI:R). The impact primarily affects integrity and availability, with no direct confidentiality loss. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability is classified under CWE-352, which is a common web application security weakness related to CSRF. Given the plugin’s role in automating data workflows between WordPress forms and Google Sheets, exploitation could lead to unauthorized data manipulation or disruption of data synchronization processes.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those relying on WordPress sites with Gravity Forms and the CRM Perks Connector plugin to manage customer data, lead generation, or internal workflows. Successful exploitation could result in unauthorized modification or deletion of form data being sent to Google Sheets, potentially corrupting business records or disrupting operational processes. This could affect sectors such as e-commerce, marketing, customer relationship management, and any business using automated form-to-spreadsheet data pipelines. While there is no direct confidentiality breach, integrity and availability impacts could lead to financial losses, reputational damage, and compliance issues under regulations like GDPR if data accuracy is compromised. The requirement for user interaction means that phishing or social engineering could be used to trigger the attack, increasing the risk in environments where users are less security-aware. The lack of known exploits suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the CRM Perks Connector for Gravity Forms and Google Sheets plugin, particularly versions up to 1.2.4. Until an official patch is released, administrators should consider disabling or removing the plugin if it is not critical to business operations. For essential deployments, implement additional CSRF protections at the web application firewall (WAF) level, such as enforcing strict origin and referer header checks to block unauthorized cross-site requests. Educate users about phishing risks to reduce the likelihood of user interaction-based exploitation. Monitor web server and application logs for unusual POST requests or suspicious referrer headers targeting the plugin’s endpoints. Additionally, consider isolating the WordPress environment from critical internal systems and limiting permissions of the plugin’s service accounts to minimize potential damage. Once a patch is available, prioritize prompt application and verify the update’s effectiveness through testing.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-54682: CWE-352 Cross-Site Request Forgery (CSRF) in CRM Perks Connector for Gravity Forms and Google Sheets
Description
Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks Connector for Gravity Forms and Google Sheets allows Cross Site Request Forgery. This issue affects Connector for Gravity Forms and Google Sheets: from n/a through 1.2.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-54682 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the CRM Perks Connector for Gravity Forms and Google Sheets plugin, affecting versions up to 1.2.4. This plugin integrates Gravity Forms, a popular WordPress form builder, with Google Sheets, enabling automated data transfer from form submissions to spreadsheet documents. The vulnerability arises due to insufficient protection against CSRF attacks, which allow an attacker to trick an authenticated user into submitting unwanted requests to the web application without their consent. Specifically, an attacker could craft a malicious web page or link that, when visited by an authenticated user, causes the plugin to perform unintended actions such as modifying data or triggering processes within the Gravity Forms and Google Sheets integration. The CVSS v3.1 base score of 5.4 (medium severity) reflects that the vulnerability can be exploited remotely over the network without requiring privileges (AV:N/AC:L/PR:N), but does require user interaction (UI:R). The impact primarily affects integrity and availability, with no direct confidentiality loss. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability is classified under CWE-352, which is a common web application security weakness related to CSRF. Given the plugin’s role in automating data workflows between WordPress forms and Google Sheets, exploitation could lead to unauthorized data manipulation or disruption of data synchronization processes.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those relying on WordPress sites with Gravity Forms and the CRM Perks Connector plugin to manage customer data, lead generation, or internal workflows. Successful exploitation could result in unauthorized modification or deletion of form data being sent to Google Sheets, potentially corrupting business records or disrupting operational processes. This could affect sectors such as e-commerce, marketing, customer relationship management, and any business using automated form-to-spreadsheet data pipelines. While there is no direct confidentiality breach, integrity and availability impacts could lead to financial losses, reputational damage, and compliance issues under regulations like GDPR if data accuracy is compromised. The requirement for user interaction means that phishing or social engineering could be used to trigger the attack, increasing the risk in environments where users are less security-aware. The lack of known exploits suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the CRM Perks Connector for Gravity Forms and Google Sheets plugin, particularly versions up to 1.2.4. Until an official patch is released, administrators should consider disabling or removing the plugin if it is not critical to business operations. For essential deployments, implement additional CSRF protections at the web application firewall (WAF) level, such as enforcing strict origin and referer header checks to block unauthorized cross-site requests. Educate users about phishing risks to reduce the likelihood of user interaction-based exploitation. Monitor web server and application logs for unusual POST requests or suspicious referrer headers targeting the plugin’s endpoints. Additionally, consider isolating the WordPress environment from critical internal systems and limiting permissions of the plugin’s service accounts to minimize potential damage. Once a patch is available, prioritize prompt application and verify the update’s effectiveness through testing.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-07-28T10:55:49.522Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689dbee6ad5a09ad0059e6ae
Added to database: 8/14/2025, 10:48:06 AM
Last enriched: 8/14/2025, 11:20:11 AM
Last updated: 8/28/2025, 1:03:11 AM
Views: 7
Related Threats
CVE-2025-58362: CWE-706: Use of Incorrectly-Resolved Name or Reference in honojs hono
HighCVE-2025-58179: CWE-918: Server-Side Request Forgery (SSRF) in withastro astro
HighCVE-2025-55739: CWE-798: Use of Hard-coded Credentials in FreePBX security-reporting
MediumCVE-2025-58352: CWE-613: Insufficient Session Expiration in WeblateOrg weblate
LowCVE-2025-55244: CWE-284: Improper Access Control in Microsoft Azure Bot Service
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.