CVE-2025-5692: CWE-862 Missing Authorization in smackcoders Lead Form Data Collection to CRM
The Lead Form Data Collection to CRM plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the ~/includes/LB_admin_ajax.php file in all versions up to, and including, 3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform several actions like updating settings. Initially this CVE was assigned specifically to all AJAX actions and the doFieldAjaxAction() function, however it was determined that CVE-2025-47690 is assigned to the doFieldAjaxAction() function that leads to arbitrary options updates.
AI Analysis
Technical Summary
CVE-2025-5692 is a medium-severity vulnerability affecting the WordPress plugin 'Lead Form Data Collection to CRM' developed by smackcoders. The vulnerability arises from a missing authorization check (CWE-862) in several functions within the ~/includes/LB_admin_ajax.php file across all plugin versions up to and including 3.1. This flaw allows authenticated users with Subscriber-level privileges or higher to perform unauthorized actions such as updating plugin settings via AJAX requests. Notably, this vulnerability is distinct from CVE-2025-47690, which specifically concerns the doFieldAjaxAction() function enabling arbitrary option updates. CVE-2025-5692 impacts multiple AJAX functions lacking proper capability verification, enabling privilege escalation within the scope of authenticated users. The CVSS 3.1 base score is 6.3, reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacts on confidentiality, integrity, and availability at a low level. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability could be exploited by any authenticated user, including those with minimal privileges, to manipulate plugin configurations, potentially leading to further compromise or data leakage depending on the plugin’s integration with CRM systems.
Potential Impact
For European organizations using WordPress sites with the 'Lead Form Data Collection to CRM' plugin, this vulnerability poses a risk of unauthorized configuration changes by low-privileged users. This could lead to data integrity issues, unauthorized data access, or disruption of lead data processing workflows critical for business operations. Organizations handling sensitive customer or lead information may face confidentiality breaches or compliance issues under GDPR if unauthorized access leads to data exposure. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the WordPress environment, potentially escalating privileges or injecting malicious payloads. The impact is particularly significant for companies relying heavily on CRM integrations for sales and marketing automation, as manipulation of lead data or settings could degrade business intelligence and customer relationship management. Although no active exploits are known, the ease of exploitation by authenticated users and the widespread use of WordPress in Europe make this a notable threat.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the 'Lead Form Data Collection to CRM' plugin. Until an official patch is released, administrators should restrict Subscriber-level user registrations or limit plugin access to trusted users only. Implementing strict role-based access controls and monitoring AJAX requests to the affected endpoints can help detect and prevent unauthorized actions. Employing Web Application Firewalls (WAFs) with custom rules to block suspicious AJAX calls targeting LB_admin_ajax.php functions is recommended. Regularly reviewing user privileges and removing unnecessary accounts reduces the attack surface. Organizations should also subscribe to vendor advisories for prompt patch deployment once available. In the interim, consider disabling or replacing the plugin if it is not critical to business operations. Logging and alerting on configuration changes within WordPress can provide early warning of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-5692: CWE-862 Missing Authorization in smackcoders Lead Form Data Collection to CRM
Description
The Lead Form Data Collection to CRM plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the ~/includes/LB_admin_ajax.php file in all versions up to, and including, 3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform several actions like updating settings. Initially this CVE was assigned specifically to all AJAX actions and the doFieldAjaxAction() function, however it was determined that CVE-2025-47690 is assigned to the doFieldAjaxAction() function that leads to arbitrary options updates.
AI-Powered Analysis
Technical Analysis
CVE-2025-5692 is a medium-severity vulnerability affecting the WordPress plugin 'Lead Form Data Collection to CRM' developed by smackcoders. The vulnerability arises from a missing authorization check (CWE-862) in several functions within the ~/includes/LB_admin_ajax.php file across all plugin versions up to and including 3.1. This flaw allows authenticated users with Subscriber-level privileges or higher to perform unauthorized actions such as updating plugin settings via AJAX requests. Notably, this vulnerability is distinct from CVE-2025-47690, which specifically concerns the doFieldAjaxAction() function enabling arbitrary option updates. CVE-2025-5692 impacts multiple AJAX functions lacking proper capability verification, enabling privilege escalation within the scope of authenticated users. The CVSS 3.1 base score is 6.3, reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacts on confidentiality, integrity, and availability at a low level. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability could be exploited by any authenticated user, including those with minimal privileges, to manipulate plugin configurations, potentially leading to further compromise or data leakage depending on the plugin’s integration with CRM systems.
Potential Impact
For European organizations using WordPress sites with the 'Lead Form Data Collection to CRM' plugin, this vulnerability poses a risk of unauthorized configuration changes by low-privileged users. This could lead to data integrity issues, unauthorized data access, or disruption of lead data processing workflows critical for business operations. Organizations handling sensitive customer or lead information may face confidentiality breaches or compliance issues under GDPR if unauthorized access leads to data exposure. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the WordPress environment, potentially escalating privileges or injecting malicious payloads. The impact is particularly significant for companies relying heavily on CRM integrations for sales and marketing automation, as manipulation of lead data or settings could degrade business intelligence and customer relationship management. Although no active exploits are known, the ease of exploitation by authenticated users and the widespread use of WordPress in Europe make this a notable threat.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the 'Lead Form Data Collection to CRM' plugin. Until an official patch is released, administrators should restrict Subscriber-level user registrations or limit plugin access to trusted users only. Implementing strict role-based access controls and monitoring AJAX requests to the affected endpoints can help detect and prevent unauthorized actions. Employing Web Application Firewalls (WAFs) with custom rules to block suspicious AJAX calls targeting LB_admin_ajax.php functions is recommended. Regularly reviewing user privileges and removing unnecessary accounts reduces the attack surface. Organizations should also subscribe to vendor advisories for prompt patch deployment once available. In the interim, consider disabling or replacing the plugin if it is not critical to business operations. Logging and alerting on configuration changes within WordPress can provide early warning of exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-04T20:04:29.128Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68649be16f40f0eb729133b2
Added to database: 7/2/2025, 2:39:29 AM
Last enriched: 8/28/2025, 1:05:45 AM
Last updated: 10/1/2025, 1:50:10 PM
Views: 64
Related Threats
CVE-2025-59489: Arbitrary Code Execution in Unity Runtime
MediumCVE-2025-61847
UnknownCVE-2025-59300: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumCVE-2025-59299: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumCVE-2025-59298: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.