Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67570: Missing Authorization in GSheetConnector by WesternDeal WPForms Google Sheet Connector

0
Medium
VulnerabilityCVE-2025-67570cvecve-2025-67570
Published: Tue Dec 09 2025 (12/09/2025, 14:14:12 UTC)
Source: CVE Database V5
Vendor/Project: GSheetConnector by WesternDeal
Product: WPForms Google Sheet Connector

Description

Missing Authorization vulnerability in GSheetConnector by WesternDeal WPForms Google Sheet Connector gsheetconnector-wpforms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPForms Google Sheet Connector: from n/a through <= 4.0.0.

AI-Powered Analysis

AILast updated: 12/09/2025, 15:06:33 UTC

Technical Analysis

The CVE-2025-67570 vulnerability is a Missing Authorization issue found in the GSheetConnector by WesternDeal, a plugin that integrates WPForms with Google Sheets. This vulnerability arises from improperly configured access control security levels, allowing unauthorized users to bypass authorization checks. The affected product versions include all releases up to and including 4.0.0. The flaw enables attackers to exploit the plugin's functionality without proper permissions, potentially allowing them to read, modify, or inject data into Google Sheets linked via WPForms forms. Since WPForms is a widely used WordPress form builder and the Google Sheet Connector facilitates automated data transfer, this vulnerability could expose sensitive form submission data or allow malicious data manipulation. No CVSS score has been assigned yet, and no known exploits have been observed in the wild. The vulnerability does not require authentication or user interaction, increasing the risk of exploitation. The lack of patch links indicates that fixes may not yet be publicly available, emphasizing the need for immediate risk mitigation. The vulnerability impacts confidentiality and integrity primarily, with potential availability impact if data manipulation disrupts business processes. Organizations using this plugin in their WordPress environments should prioritize assessment and mitigation to prevent unauthorized data access or corruption.

Potential Impact

For European organizations, this vulnerability poses a significant risk to data confidentiality and integrity, especially for those relying on WPForms and the GSheetConnector plugin for critical business workflows involving Google Sheets. Unauthorized access could lead to leakage of sensitive customer or operational data collected via forms, manipulation of data used for decision-making, or injection of malicious content into spreadsheets. This could result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data exposure), and operational disruptions. The ease of exploitation without authentication increases the threat level, particularly for organizations with publicly accessible WordPress forms. Additionally, the absence of patches means organizations must rely on compensating controls, which may not fully mitigate the risk. The impact is heightened in sectors such as finance, healthcare, and government, where data sensitivity and regulatory scrutiny are high.

Mitigation Recommendations

1. Immediately audit all WordPress installations for the presence of the GSheetConnector by WesternDeal WPForms Google Sheet Connector plugin and identify affected versions (<= 4.0.0). 2. Disable or uninstall the plugin if it is not essential until a patch is available. 3. If the plugin is critical, restrict access to WordPress admin and form submission endpoints using IP whitelisting, VPNs, or web application firewalls (WAFs) to limit exposure. 4. Implement strict role-based access controls within WordPress to ensure only trusted users can manage forms and connectors. 5. Monitor logs for unusual activity related to form submissions and Google Sheets integrations. 6. Regularly check for vendor updates or patches and apply them promptly once released. 7. Consider alternative secure plugins or custom integrations with proper authorization checks. 8. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling if exploitation is suspected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:28.862Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833ab29cea75c35ae56dd

Added to database: 12/9/2025, 2:35:23 PM

Last enriched: 12/9/2025, 3:06:33 PM

Last updated: 12/11/2025, 4:00:35 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats