Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64384: Missing Authorization in jetmonsters JetFormBuilder

0
Medium
VulnerabilityCVE-2025-64384cvecve-2025-64384
Published: Thu Nov 13 2025 (11/13/2025, 09:24:36 UTC)
Source: CVE Database V5
Vendor/Project: jetmonsters
Product: JetFormBuilder

Description

Missing Authorization vulnerability in jetmonsters JetFormBuilder jetformbuilder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JetFormBuilder: from n/a through <= 3.5.3.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:12:20 UTC

Technical Analysis

CVE-2025-64384 identifies a missing authorization vulnerability in the JetFormBuilder plugin developed by jetmonsters, affecting all versions up to and including 3.5.3. This vulnerability arises from incorrectly configured access control mechanisms within the plugin, allowing attackers with low-level privileges (PR:L) to perform unauthorized actions remotely (AV:N) without requiring user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L), as attackers can potentially access or modify data and disrupt form-related functionalities. JetFormBuilder is a WordPress plugin widely used for creating and managing forms on websites. The missing authorization means that certain operations intended to be restricted to privileged users can be executed by lower-privileged users, potentially leading to unauthorized data access or manipulation. Although no public exploits are known at this time, the vulnerability's medium CVSS score (6.3) reflects a moderate risk that could be leveraged in targeted attacks. The issue was reserved in late October 2025 and published in mid-November 2025, indicating recent discovery and disclosure. The lack of available patches at the time of disclosure necessitates immediate attention to access control policies and monitoring until updates are released.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, especially for those relying on JetFormBuilder for customer-facing forms, data collection, or internal workflows. Unauthorized access could lead to exposure or alteration of sensitive data submitted via forms, undermining data confidentiality and integrity. Availability of form services could also be affected if attackers exploit the flaw to disrupt normal operations. Organizations in sectors such as e-commerce, finance, healthcare, and public services that use WordPress and JetFormBuilder are particularly at risk due to the sensitive nature of data handled. The impact is compounded by the plugin's popularity in Europe, where WordPress powers a significant portion of websites. Attackers exploiting this vulnerability could gain footholds for further lateral movement or data exfiltration. Given the medium severity and remote exploitability without user interaction, the threat warrants proactive mitigation to prevent potential breaches or service disruptions.

Mitigation Recommendations

European organizations should immediately audit their WordPress environments to identify installations of JetFormBuilder, particularly versions up to 3.5.3. Until an official patch is released, restrict user roles and permissions to the minimum necessary, especially limiting low-privilege users from accessing form management features. Implement web application firewalls (WAFs) with custom rules to detect and block anomalous requests targeting JetFormBuilder endpoints. Monitor logs for unusual access patterns or unauthorized attempts to manipulate forms or access restricted data. Consider temporarily disabling the plugin if it is not critical to operations. Engage with the vendor or security community for updates on patches or workarounds. Additionally, ensure that WordPress core and other plugins are up to date to reduce the attack surface. Conduct regular security assessments focusing on access control configurations within WordPress and its plugins. Finally, educate administrators and developers on secure plugin management and the importance of timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-31T11:25:32.711Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6915aa35dac9b42fc37a5aed

Added to database: 11/13/2025, 9:51:49 AM

Last enriched: 1/21/2026, 12:12:20 AM

Last updated: 2/6/2026, 2:01:43 AM

Views: 130

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats