Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67979: Improper Control of Generation of Code ('Code Injection') in WesternDeal WPForms Google Sheet Connector

0
Critical
VulnerabilityCVE-2025-67979cvecve-2025-67979
Published: Fri Feb 20 2026 (02/20/2026, 15:46:30 UTC)
Source: CVE Database V5
Vendor/Project: WesternDeal
Product: WPForms Google Sheet Connector

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in WesternDeal WPForms Google Sheet Connector gsheetconnector-wpforms allows Code Injection.This issue affects WPForms Google Sheet Connector: from n/a through <= 4.0.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 05:27:26 UTC

Technical Analysis

CVE-2025-67979 is a critical security vulnerability classified as 'Improper Control of Generation of Code' or code injection in the WesternDeal WPForms Google Sheet Connector plugin (gsheetconnector-wpforms) for WordPress. This plugin facilitates integration between WPForms and Google Sheets, allowing form data to be sent directly to Google Sheets. The vulnerability exists in all versions up to and including 4.0.1. It allows an attacker with at least low-level privileges (PR:L) to inject malicious code that the plugin improperly generates or executes. The attack vector is network-based (AV:N), requiring no user interaction (UI:N), and the vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected systems. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. Exploitation could lead to remote code execution, data theft, data manipulation, or denial of service. Although no exploits are currently known in the wild, the high CVSS score (9.9) underscores the critical nature of this flaw. The vulnerability was reserved in December 2025 and published in February 2026. No patches or fixes are currently linked, indicating that mitigation steps must be carefully planned. The vulnerability is particularly dangerous because it allows code injection through improper handling of code generation, which is a severe security flaw in web applications.

Potential Impact

The impact of CVE-2025-67979 is severe for organizations using the WesternDeal WPForms Google Sheet Connector plugin. Successful exploitation can lead to full remote code execution on the affected WordPress server, compromising the confidentiality, integrity, and availability of the system and data. Attackers could steal sensitive form data, manipulate or delete data in Google Sheets, or use the compromised server as a foothold for further attacks within the network. This can result in data breaches, operational disruption, reputational damage, and potential regulatory penalties. Since the vulnerability requires only low privileges and no user interaction, it lowers the barrier for attackers who have limited access. The changed scope means that the impact can extend beyond the plugin itself, potentially affecting other components or systems connected to the WordPress environment. Organizations relying on this plugin for business-critical workflows involving form data and Google Sheets integration are at significant risk.

Mitigation Recommendations

1. Immediately check for updates or patches from WesternDeal for the WPForms Google Sheet Connector plugin and apply them as soon as they become available. 2. If no patch is available, consider temporarily disabling the plugin or removing it until a fix is released to prevent exploitation. 3. Restrict access to the WordPress admin panel and plugin settings to trusted users only, enforcing strong authentication and least privilege principles. 4. Monitor logs for unusual activity related to the plugin, such as unexpected code execution or abnormal network requests. 5. Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the plugin endpoints. 6. Regularly back up WordPress sites and associated data, including Google Sheets, to enable recovery in case of compromise. 7. Conduct security audits and code reviews of custom integrations involving WPForms and Google Sheets to identify potential injection points. 8. Educate administrators and developers about the risks of code injection vulnerabilities and secure coding practices. 9. Consider isolating critical WordPress instances or running them in hardened environments with minimal privileges and network segmentation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:33.669Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9eabe58cf853bab8344

Added to database: 2/20/2026, 8:54:02 PM

Last enriched: 4/3/2026, 5:27:26 AM

Last updated: 4/7/2026, 1:39:27 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses