Skip to main content

CVE-2025-7654: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce

High
VulnerabilityCVE-2025-7654cvecve-2025-7654cwe-200
Published: Tue Aug 19 2025 (08/19/2025, 07:26:27 UTC)
Source: CVE Database V5
Vendor/Project: amans2k
Product: FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce

Description

Multiple FunnelKit plugins are vulnerable to Sensitive Information Exposure via the wf_get_cookie shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including authentication cookies of other site users, which may make privilege escalation possible. Please note both FunnelKit – Funnel Builder for WooCommerce Checkout AND FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce are affected by this.

AI-Powered Analysis

AILast updated: 08/19/2025, 07:48:06 UTC

Technical Analysis

CVE-2025-7654 is a high-severity vulnerability (CVSS 8.8) affecting multiple FunnelKit plugins developed by amans2k, specifically FunnelKit – Funnel Builder for WooCommerce Checkout and FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce. The vulnerability is classified under CWE-200, which involves the exposure of sensitive information to unauthorized actors. The root cause lies in the improper handling of the wf_get_cookie shortcode, which allows authenticated users with Contributor-level permissions or higher to extract sensitive data, including authentication cookies of other users on the site. This exposure can lead to privilege escalation, as attackers can hijack sessions or impersonate higher-privilege users. The vulnerability requires no user interaction beyond authentication at the Contributor level, making it relatively easy to exploit remotely over the network (AV:N). The attack complexity is low (AC:L), and the scope is unchanged (S:U), meaning the impact is confined to the vulnerable component but affects confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). No patches are currently linked, and no known exploits are reported in the wild as of the publication date (August 19, 2025). Given that FunnelKit plugins are widely used in WordPress and WooCommerce environments for marketing automation and CRM, this vulnerability poses a significant risk to websites that rely on these plugins for customer engagement and sales funnel management.

Potential Impact

For European organizations, the impact of CVE-2025-7654 can be severe, especially for e-commerce businesses and marketing teams using WordPress with WooCommerce and FunnelKit plugins. Exposure of authentication cookies can lead to unauthorized access to user accounts, including administrative accounts, resulting in data breaches, unauthorized transactions, and manipulation of marketing campaigns or customer data. This can cause reputational damage, loss of customer trust, and potential regulatory penalties under GDPR due to unauthorized access to personal data. The ability to escalate privileges from Contributor to higher roles increases the risk of full site compromise, data tampering, and service disruption. Additionally, attackers could leverage compromised sites to distribute malware or conduct phishing campaigns, further amplifying the threat landscape for European organizations relying on these platforms.

Mitigation Recommendations

Immediate mitigation steps include restricting Contributor-level access to trusted users only and auditing existing user roles to minimize exposure. Administrators should monitor for unusual activity related to user sessions and authentication cookies. Since no official patches are currently linked, organizations should consider temporarily disabling the wf_get_cookie shortcode functionality or removing the affected FunnelKit plugins until a vendor patch is released. Implementing Web Application Firewall (WAF) rules to detect and block attempts to exploit the shortcode can reduce risk. Regularly updating WordPress core, WooCommerce, and all plugins is critical once patches become available. Additionally, enforcing multi-factor authentication (MFA) for all user accounts can limit the impact of stolen authentication cookies. Conducting thorough security reviews and penetration testing focused on privilege escalation vectors in the affected environment is recommended to identify and remediate any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-14T17:44:54.928Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a4289bad5a09ad00f3cae9

Added to database: 8/19/2025, 7:32:43 AM

Last enriched: 8/19/2025, 7:48:06 AM

Last updated: 8/19/2025, 7:48:06 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats