Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64384: Missing Authorization in jetmonsters JetFormBuilder

0
Medium
VulnerabilityCVE-2025-64384cvecve-2025-64384
Published: Thu Nov 13 2025 (11/13/2025, 09:24:36 UTC)
Source: CVE Database V5
Vendor/Project: jetmonsters
Product: JetFormBuilder

Description

Missing Authorization vulnerability in jetmonsters JetFormBuilder jetformbuilder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JetFormBuilder: from n/a through <= 3.5.3.

AI-Powered Analysis

AILast updated: 11/21/2025, 19:20:46 UTC

Technical Analysis

CVE-2025-64384 is a missing authorization vulnerability identified in the JetFormBuilder plugin developed by jetmonsters, affecting all versions up to and including 3.5.3. JetFormBuilder is a WordPress plugin used to create advanced forms, often deployed in websites for data collection and user interaction. The vulnerability arises from incorrectly configured access control security levels, allowing attackers with low privileges (PR:L) to bypass authorization checks and perform actions beyond their intended permissions. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) indicates that the attack can be performed remotely over the network without user interaction, requires low privileges, and impacts confidentiality, integrity, and availability to a limited extent. Specifically, an attacker could exploit this flaw to access or modify sensitive form data or configurations, potentially leading to data leakage, unauthorized changes, or disruption of form functionality. Although no known exploits are currently reported in the wild, the vulnerability’s presence in a widely used plugin makes it a significant concern. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for vigilance. The issue was reserved on 2025-10-31 and published on 2025-11-13, indicating recent disclosure. The vulnerability is classified as medium severity, reflecting a balance between ease of exploitation and impact scope.

Potential Impact

For European organizations, especially those relying on WordPress websites with JetFormBuilder for customer interactions, data collection, or e-commerce, this vulnerability poses a tangible risk. Unauthorized access to form data could lead to exposure of personal or sensitive information, violating GDPR and other data protection regulations. Integrity compromises could allow attackers to alter form submissions or configurations, potentially disrupting business processes or enabling further attacks such as phishing or fraud. Availability impacts, while limited, could degrade user experience or interrupt service. Given the remote network attack vector and lack of user interaction requirement, attackers could automate exploitation attempts, increasing risk. Organizations in sectors like retail, finance, healthcare, and government, which often use web forms for critical functions, may face heightened exposure. Failure to address this vulnerability could result in regulatory penalties, reputational damage, and operational disruptions.

Mitigation Recommendations

1. Monitor official jetmonsters and WordPress plugin repositories for the release of a security patch addressing CVE-2025-64384 and apply updates immediately upon availability. 2. Until a patch is available, restrict access to JetFormBuilder administrative interfaces and sensitive form management pages using network-level controls such as IP whitelisting or VPN access. 3. Conduct a thorough audit of user roles and permissions within WordPress to ensure that only trusted users have low-level privileges that could be leveraged for exploitation. 4. Implement Web Application Firewall (WAF) rules to detect and block anomalous requests targeting JetFormBuilder endpoints, focusing on unusual access patterns or privilege escalation attempts. 5. Enable detailed logging and monitoring of form-related activities to quickly identify unauthorized access or modifications. 6. Educate site administrators about the vulnerability and encourage prompt reporting of suspicious behavior. 7. Consider temporary disabling of JetFormBuilder on non-critical sites if risk tolerance is low and patching is delayed. 8. Review and harden overall WordPress security posture, including regular backups and incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-31T11:25:32.711Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6915aa35dac9b42fc37a5aed

Added to database: 11/13/2025, 9:51:49 AM

Last enriched: 11/21/2025, 7:20:46 PM

Last updated: 12/29/2025, 8:16:36 AM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats