Skip to main content

CVE-2025-5692: CWE-862 Missing Authorization in smackcoders Lead Form Data Collection to CRM

Medium
VulnerabilityCVE-2025-5692cvecve-2025-5692cwe-862
Published: Wed Jul 02 2025 (07/02/2025, 02:03:53 UTC)
Source: CVE Database V5
Vendor/Project: smackcoders
Product: Lead Form Data Collection to CRM

Description

The Lead Form Data Collection to CRM plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the ~/includes/LB_admin_ajax.php file in all versions up to, and including, 3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform several actions like updating settings. Initially this CVE was assigned specifically to all AJAX actions and the doFieldAjaxAction() function, however it was determined that CVE-2025-47690 is assigned to the doFieldAjaxAction() function that leads to arbitrary options updates.

AI-Powered Analysis

AILast updated: 08/28/2025, 01:05:45 UTC

Technical Analysis

CVE-2025-5692 is a medium-severity vulnerability affecting the WordPress plugin 'Lead Form Data Collection to CRM' developed by smackcoders. The vulnerability arises from a missing authorization check (CWE-862) in several functions within the ~/includes/LB_admin_ajax.php file across all plugin versions up to and including 3.1. This flaw allows authenticated users with Subscriber-level privileges or higher to perform unauthorized actions such as updating plugin settings via AJAX requests. Notably, this vulnerability is distinct from CVE-2025-47690, which specifically concerns the doFieldAjaxAction() function enabling arbitrary option updates. CVE-2025-5692 impacts multiple AJAX functions lacking proper capability verification, enabling privilege escalation within the scope of authenticated users. The CVSS 3.1 base score is 6.3, reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacts on confidentiality, integrity, and availability at a low level. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability could be exploited by any authenticated user, including those with minimal privileges, to manipulate plugin configurations, potentially leading to further compromise or data leakage depending on the plugin’s integration with CRM systems.

Potential Impact

For European organizations using WordPress sites with the 'Lead Form Data Collection to CRM' plugin, this vulnerability poses a risk of unauthorized configuration changes by low-privileged users. This could lead to data integrity issues, unauthorized data access, or disruption of lead data processing workflows critical for business operations. Organizations handling sensitive customer or lead information may face confidentiality breaches or compliance issues under GDPR if unauthorized access leads to data exposure. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the WordPress environment, potentially escalating privileges or injecting malicious payloads. The impact is particularly significant for companies relying heavily on CRM integrations for sales and marketing automation, as manipulation of lead data or settings could degrade business intelligence and customer relationship management. Although no active exploits are known, the ease of exploitation by authenticated users and the widespread use of WordPress in Europe make this a notable threat.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the 'Lead Form Data Collection to CRM' plugin. Until an official patch is released, administrators should restrict Subscriber-level user registrations or limit plugin access to trusted users only. Implementing strict role-based access controls and monitoring AJAX requests to the affected endpoints can help detect and prevent unauthorized actions. Employing Web Application Firewalls (WAFs) with custom rules to block suspicious AJAX calls targeting LB_admin_ajax.php functions is recommended. Regularly reviewing user privileges and removing unnecessary accounts reduces the attack surface. Organizations should also subscribe to vendor advisories for prompt patch deployment once available. In the interim, consider disabling or replacing the plugin if it is not critical to business operations. Logging and alerting on configuration changes within WordPress can provide early warning of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-04T20:04:29.128Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68649be16f40f0eb729133b2

Added to database: 7/2/2025, 2:39:29 AM

Last enriched: 8/28/2025, 1:05:45 AM

Last updated: 10/1/2025, 1:50:10 PM

Views: 64

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats