Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67468: Missing Authorization in CRM Perks Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms

0
Medium
VulnerabilityCVE-2025-67468cvecve-2025-67468
Published: Tue Dec 09 2025 (12/09/2025, 14:13:55 UTC)
Source: CVE Database V5
Vendor/Project: CRM Perks
Product: Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms

Description

Missing Authorization vulnerability in CRM Perks Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms cf7-salesforce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms: from n/a through <= 1.4.6.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:44:56 UTC

Technical Analysis

CVE-2025-67468 is a vulnerability identified in the CRM Perks Integration plugin that connects Salesforce CRM with several widely used WordPress form plugins: Contact Form 7, WPForms, Elementor, Formidable, and Ninja Forms. The root cause is missing authorization controls within the integration, which leads to incorrect access control enforcement. Specifically, users with limited privileges (PR:L) can exploit this flaw to perform unauthorized actions that should be restricted, such as modifying integration settings or manipulating data flows between WordPress forms and Salesforce. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N). The CVSS 3.1 base score is 4.3, reflecting a medium severity level primarily due to its impact on data integrity without affecting confidentiality or availability. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component and does not extend to other components or systems. No public exploits have been reported yet, but the risk remains significant for organizations relying on these integrations for CRM data collection and processing. The affected versions are all versions up to and including 1.4.6, with no specific earliest version identified. The vulnerability was published on December 9, 2025, by Patchstack. Due to the widespread use of these WordPress plugins and Salesforce in business environments, the vulnerability could be leveraged to alter CRM data or form submission processes, potentially leading to data integrity issues or business process disruptions.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity of CRM data and form submission workflows. Unauthorized users with limited privileges could manipulate data sent to Salesforce or alter integration configurations, potentially causing inaccurate customer data, erroneous sales records, or disruption of automated business processes. This could undermine decision-making, customer relationship management, and compliance with data governance policies. While confidentiality and availability are not directly impacted, the integrity compromise could lead to financial losses, reputational damage, and regulatory scrutiny, especially under GDPR where data accuracy is critical. Organizations heavily reliant on Salesforce integrated with WordPress forms are particularly vulnerable. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

Organizations should immediately audit their use of the CRM Perks Integration plugin and identify if they are running affected versions (<=1.4.6). Until a patch is released, restrict access to the integration’s administrative interfaces to trusted users only and enforce the principle of least privilege rigorously. Review and tighten user roles and permissions within WordPress and Salesforce to ensure no unnecessary privileges are granted. Monitor logs for unusual activities related to integration endpoints or form submissions. Implement web application firewalls (WAFs) with rules targeting suspicious access patterns to these plugins. Once a vendor patch or update is available, apply it promptly. Additionally, consider isolating or segmenting systems that handle CRM integration to limit potential lateral movement in case of exploitation. Regularly back up CRM and form data to enable recovery from potential integrity compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-08T16:00:53.489Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833a029cea75c35ae51eb

Added to database: 12/9/2025, 2:35:12 PM

Last enriched: 1/21/2026, 12:44:56 AM

Last updated: 2/7/2026, 4:47:51 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats