Skip to main content

CVE-2025-54682: CWE-352 Cross-Site Request Forgery (CSRF) in CRM Perks Connector for Gravity Forms and Google Sheets

Medium
VulnerabilityCVE-2025-54682cvecve-2025-54682cwe-352
Published: Thu Aug 14 2025 (08/14/2025, 10:34:46 UTC)
Source: CVE Database V5
Vendor/Project: CRM Perks
Product: Connector for Gravity Forms and Google Sheets

Description

Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks Connector for Gravity Forms and Google Sheets allows Cross Site Request Forgery. This issue affects Connector for Gravity Forms and Google Sheets: from n/a through 1.2.4.

AI-Powered Analysis

AILast updated: 08/14/2025, 11:20:11 UTC

Technical Analysis

CVE-2025-54682 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the CRM Perks Connector for Gravity Forms and Google Sheets plugin, affecting versions up to 1.2.4. This plugin integrates Gravity Forms, a popular WordPress form builder, with Google Sheets, enabling automated data transfer from form submissions to spreadsheet documents. The vulnerability arises due to insufficient protection against CSRF attacks, which allow an attacker to trick an authenticated user into submitting unwanted requests to the web application without their consent. Specifically, an attacker could craft a malicious web page or link that, when visited by an authenticated user, causes the plugin to perform unintended actions such as modifying data or triggering processes within the Gravity Forms and Google Sheets integration. The CVSS v3.1 base score of 5.4 (medium severity) reflects that the vulnerability can be exploited remotely over the network without requiring privileges (AV:N/AC:L/PR:N), but does require user interaction (UI:R). The impact primarily affects integrity and availability, with no direct confidentiality loss. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability is classified under CWE-352, which is a common web application security weakness related to CSRF. Given the plugin’s role in automating data workflows between WordPress forms and Google Sheets, exploitation could lead to unauthorized data manipulation or disruption of data synchronization processes.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, especially for those relying on WordPress sites with Gravity Forms and the CRM Perks Connector plugin to manage customer data, lead generation, or internal workflows. Successful exploitation could result in unauthorized modification or deletion of form data being sent to Google Sheets, potentially corrupting business records or disrupting operational processes. This could affect sectors such as e-commerce, marketing, customer relationship management, and any business using automated form-to-spreadsheet data pipelines. While there is no direct confidentiality breach, integrity and availability impacts could lead to financial losses, reputational damage, and compliance issues under regulations like GDPR if data accuracy is compromised. The requirement for user interaction means that phishing or social engineering could be used to trigger the attack, increasing the risk in environments where users are less security-aware. The lack of known exploits suggests a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the CRM Perks Connector for Gravity Forms and Google Sheets plugin, particularly versions up to 1.2.4. Until an official patch is released, administrators should consider disabling or removing the plugin if it is not critical to business operations. For essential deployments, implement additional CSRF protections at the web application firewall (WAF) level, such as enforcing strict origin and referer header checks to block unauthorized cross-site requests. Educate users about phishing risks to reduce the likelihood of user interaction-based exploitation. Monitor web server and application logs for unusual POST requests or suspicious referrer headers targeting the plugin’s endpoints. Additionally, consider isolating the WordPress environment from critical internal systems and limiting permissions of the plugin’s service accounts to minimize potential damage. Once a patch is available, prioritize prompt application and verify the update’s effectiveness through testing.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-07-28T10:55:49.522Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689dbee6ad5a09ad0059e6ae

Added to database: 8/14/2025, 10:48:06 AM

Last enriched: 8/14/2025, 11:20:11 AM

Last updated: 8/28/2025, 1:03:11 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats