Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67468: Missing Authorization in CRM Perks Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms

0
Medium
VulnerabilityCVE-2025-67468cvecve-2025-67468
Published: Tue Dec 09 2025 (12/09/2025, 14:13:55 UTC)
Source: CVE Database V5
Vendor/Project: CRM Perks
Product: Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms

Description

Missing Authorization vulnerability in CRM Perks Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms cf7-salesforce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms: from n/a through <= 1.4.6.

AI-Powered Analysis

AILast updated: 12/09/2025, 15:46:46 UTC

Technical Analysis

CVE-2025-67468 identifies a missing authorization vulnerability in the CRM Perks Integration plugin that connects Salesforce with several widely used WordPress form builder plugins: Contact Form 7, WPForms, Elementor, Formidable, and Ninja Forms. The vulnerability stems from improperly configured access control mechanisms within the integration, which fail to adequately verify whether a user is authorized to perform certain actions or access specific data. This flaw affects all versions up to and including 1.4.6. Exploitation could allow an attacker, potentially without authentication, to bypass security controls and interact with Salesforce integration endpoints or data, leading to unauthorized data disclosure, modification, or other malicious activities. The integration plugin acts as a bridge between WordPress forms and Salesforce CRM, so unauthorized access could expose sensitive customer information or enable manipulation of CRM data. No CVSS score has been assigned yet, and no known exploits have been reported in the wild as of the publication date. However, the vulnerability’s nature suggests a significant risk, especially for organizations that rely on these plugins for customer data collection and Salesforce synchronization. The issue highlights the importance of proper access control implementation in third-party integrations, particularly those handling sensitive business data.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Many enterprises and SMEs in Europe use WordPress combined with Salesforce for customer relationship management and lead generation. Exploitation could lead to unauthorized access to sensitive customer data, violating GDPR and other data protection regulations, potentially resulting in legal penalties and reputational damage. Data integrity could be compromised if attackers manipulate CRM records, affecting business operations and decision-making. Availability risks are lower but could arise if attackers disrupt integration functionality. The vulnerability could also facilitate lateral movement within an organization's network if attackers leverage the integration to gain further access. Given the integration’s role in syncing form data to Salesforce, the risk extends to data leakage and unauthorized data manipulation, which are critical concerns for compliance-focused European entities.

Mitigation Recommendations

Organizations should immediately audit their use of the CRM Perks Integration plugin and identify if they are running affected versions (up to 1.4.6). Until an official patch is released, restrict access to the WordPress admin area and integration endpoints to trusted users only, using IP whitelisting or VPN access where possible. Review and tighten WordPress user roles and permissions to minimize exposure. Disable or remove the integration plugin if it is not essential. Monitor logs for unusual access patterns or unauthorized attempts to interact with the integration. Once a patch or update is available from CRM Perks, apply it promptly. Additionally, conduct a thorough review of Salesforce integration configurations to ensure no excessive permissions are granted. Implement network segmentation to isolate critical systems and consider deploying web application firewalls (WAF) with custom rules to detect and block suspicious requests targeting the integration endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-08T16:00:53.489Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833a029cea75c35ae51eb

Added to database: 12/9/2025, 2:35:12 PM

Last enriched: 12/9/2025, 3:46:46 PM

Last updated: 12/11/2025, 6:59:56 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats