CVE-2025-67570: Missing Authorization in GSheetConnector by WesternDeal WPForms Google Sheet Connector
Missing Authorization vulnerability in GSheetConnector by WesternDeal WPForms Google Sheet Connector gsheetconnector-wpforms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPForms Google Sheet Connector: from n/a through <= 4.0.0.
AI Analysis
Technical Summary
CVE-2025-67570 identifies a missing authorization vulnerability in the GSheetConnector by WesternDeal, a plugin that integrates WPForms with Google Sheets. This vulnerability arises from improperly configured access control security levels, allowing unauthenticated remote attackers to perform actions that should require authorization. Specifically, the plugin fails to verify whether the requester has the necessary permissions before processing requests that interact with Google Sheets. The affected versions include all releases up to and including 4.0.0. The vulnerability has a CVSS v3.1 base score of 5.3, reflecting a medium severity level. The vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). This means an attacker can remotely exploit the flaw without authentication or user interaction to alter data integrity, such as modifying or injecting data into Google Sheets linked via the plugin. No public exploits or patches are currently available, and the vulnerability was published on December 9, 2025. The issue is critical for environments relying on the plugin for data collection and processing, as unauthorized data manipulation could undermine business processes and reporting accuracy.
Potential Impact
For European organizations, the missing authorization vulnerability poses a risk primarily to data integrity within workflows that use WPForms integrated with Google Sheets via the GSheetConnector plugin. Attackers could inject or alter data without authentication, potentially corrupting business records, financial data, or customer information stored or processed through these sheets. This could lead to erroneous decision-making, compliance violations, and reputational damage. Since the vulnerability does not impact confidentiality or availability, direct data breaches or service outages are less likely. However, the integrity compromise can have cascading effects, especially in sectors like finance, healthcare, and government where data accuracy is critical. Organizations using WordPress sites with this plugin are at risk, particularly if the plugin is exposed to the internet without additional access controls. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
1. Monitor official sources for patches or updates from WesternDeal or WPForms and apply them promptly once released. 2. Until patches are available, restrict access to the WordPress admin and plugin endpoints using IP whitelisting, VPNs, or web application firewalls (WAFs) to limit exposure. 3. Implement strict role-based access controls within WordPress to minimize the number of users who can interact with the plugin. 4. Audit and monitor logs for unusual activity related to the plugin, such as unexpected API calls or data changes in connected Google Sheets. 5. Consider disabling or uninstalling the GSheetConnector plugin if it is not essential, or replace it with alternative solutions that have verified secure authorization controls. 6. Educate administrators about the risks of unauthorized plugin access and enforce strong authentication mechanisms (e.g., MFA) for WordPress accounts. 7. Regularly back up Google Sheets data and WordPress configurations to enable recovery from potential data integrity incidents.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-67570: Missing Authorization in GSheetConnector by WesternDeal WPForms Google Sheet Connector
Description
Missing Authorization vulnerability in GSheetConnector by WesternDeal WPForms Google Sheet Connector gsheetconnector-wpforms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPForms Google Sheet Connector: from n/a through <= 4.0.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-67570 identifies a missing authorization vulnerability in the GSheetConnector by WesternDeal, a plugin that integrates WPForms with Google Sheets. This vulnerability arises from improperly configured access control security levels, allowing unauthenticated remote attackers to perform actions that should require authorization. Specifically, the plugin fails to verify whether the requester has the necessary permissions before processing requests that interact with Google Sheets. The affected versions include all releases up to and including 4.0.0. The vulnerability has a CVSS v3.1 base score of 5.3, reflecting a medium severity level. The vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). This means an attacker can remotely exploit the flaw without authentication or user interaction to alter data integrity, such as modifying or injecting data into Google Sheets linked via the plugin. No public exploits or patches are currently available, and the vulnerability was published on December 9, 2025. The issue is critical for environments relying on the plugin for data collection and processing, as unauthorized data manipulation could undermine business processes and reporting accuracy.
Potential Impact
For European organizations, the missing authorization vulnerability poses a risk primarily to data integrity within workflows that use WPForms integrated with Google Sheets via the GSheetConnector plugin. Attackers could inject or alter data without authentication, potentially corrupting business records, financial data, or customer information stored or processed through these sheets. This could lead to erroneous decision-making, compliance violations, and reputational damage. Since the vulnerability does not impact confidentiality or availability, direct data breaches or service outages are less likely. However, the integrity compromise can have cascading effects, especially in sectors like finance, healthcare, and government where data accuracy is critical. Organizations using WordPress sites with this plugin are at risk, particularly if the plugin is exposed to the internet without additional access controls. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
1. Monitor official sources for patches or updates from WesternDeal or WPForms and apply them promptly once released. 2. Until patches are available, restrict access to the WordPress admin and plugin endpoints using IP whitelisting, VPNs, or web application firewalls (WAFs) to limit exposure. 3. Implement strict role-based access controls within WordPress to minimize the number of users who can interact with the plugin. 4. Audit and monitor logs for unusual activity related to the plugin, such as unexpected API calls or data changes in connected Google Sheets. 5. Consider disabling or uninstalling the GSheetConnector plugin if it is not essential, or replace it with alternative solutions that have verified secure authorization controls. 6. Educate administrators about the risks of unauthorized plugin access and enforce strong authentication mechanisms (e.g., MFA) for WordPress accounts. 7. Regularly back up Google Sheets data and WordPress configurations to enable recovery from potential data integrity incidents.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-09T12:21:28.862Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693833ab29cea75c35ae56dd
Added to database: 12/9/2025, 2:35:23 PM
Last enriched: 1/21/2026, 1:01:20 AM
Last updated: 2/6/2026, 7:37:47 AM
Views: 86
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2008: Code Injection in abhiphile fermat-mcp
MediumCVE-2026-2000: Command Injection in DCN DCME-320
MediumCVE-2026-1909: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in x-raym WaveSurfer-WP
MediumCVE-2026-1888: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in htplugins Docus – YouTube Video Playlist
MediumCVE-2026-1808: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ravanh Orange Comfort+ accessibility toolbar for WordPress
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.