CVE-2025-7654: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
Multiple FunnelKit plugins are vulnerable to Sensitive Information Exposure via the wf_get_cookie shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including authentication cookies of other site users, which may make privilege escalation possible. Please note both FunnelKit – Funnel Builder for WooCommerce Checkout AND FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce are affected by this.
AI Analysis
Technical Summary
CVE-2025-7654 is a high-severity vulnerability (CVSS 8.8) affecting multiple FunnelKit plugins developed by amans2k, specifically FunnelKit – Funnel Builder for WooCommerce Checkout and FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce. The vulnerability is classified under CWE-200, which involves the exposure of sensitive information to unauthorized actors. The root cause lies in the improper handling of the wf_get_cookie shortcode, which allows authenticated users with Contributor-level permissions or higher to extract sensitive data, including authentication cookies of other users on the site. This exposure can lead to privilege escalation, as attackers can hijack sessions or impersonate higher-privilege users. The vulnerability requires no user interaction beyond authentication at the Contributor level, making it relatively easy to exploit remotely over the network (AV:N). The attack complexity is low (AC:L), and the scope is unchanged (S:U), meaning the impact is confined to the vulnerable component but affects confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). No patches are currently linked, and no known exploits are reported in the wild as of the publication date (August 19, 2025). Given that FunnelKit plugins are widely used in WordPress and WooCommerce environments for marketing automation and CRM, this vulnerability poses a significant risk to websites that rely on these plugins for customer engagement and sales funnel management.
Potential Impact
For European organizations, the impact of CVE-2025-7654 can be severe, especially for e-commerce businesses and marketing teams using WordPress with WooCommerce and FunnelKit plugins. Exposure of authentication cookies can lead to unauthorized access to user accounts, including administrative accounts, resulting in data breaches, unauthorized transactions, and manipulation of marketing campaigns or customer data. This can cause reputational damage, loss of customer trust, and potential regulatory penalties under GDPR due to unauthorized access to personal data. The ability to escalate privileges from Contributor to higher roles increases the risk of full site compromise, data tampering, and service disruption. Additionally, attackers could leverage compromised sites to distribute malware or conduct phishing campaigns, further amplifying the threat landscape for European organizations relying on these platforms.
Mitigation Recommendations
Immediate mitigation steps include restricting Contributor-level access to trusted users only and auditing existing user roles to minimize exposure. Administrators should monitor for unusual activity related to user sessions and authentication cookies. Since no official patches are currently linked, organizations should consider temporarily disabling the wf_get_cookie shortcode functionality or removing the affected FunnelKit plugins until a vendor patch is released. Implementing Web Application Firewall (WAF) rules to detect and block attempts to exploit the shortcode can reduce risk. Regularly updating WordPress core, WooCommerce, and all plugins is critical once patches become available. Additionally, enforcing multi-factor authentication (MFA) for all user accounts can limit the impact of stolen authentication cookies. Conducting thorough security reviews and penetration testing focused on privilege escalation vectors in the affected environment is recommended to identify and remediate any exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-7654: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
Description
Multiple FunnelKit plugins are vulnerable to Sensitive Information Exposure via the wf_get_cookie shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including authentication cookies of other site users, which may make privilege escalation possible. Please note both FunnelKit – Funnel Builder for WooCommerce Checkout AND FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce are affected by this.
AI-Powered Analysis
Technical Analysis
CVE-2025-7654 is a high-severity vulnerability (CVSS 8.8) affecting multiple FunnelKit plugins developed by amans2k, specifically FunnelKit – Funnel Builder for WooCommerce Checkout and FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce. The vulnerability is classified under CWE-200, which involves the exposure of sensitive information to unauthorized actors. The root cause lies in the improper handling of the wf_get_cookie shortcode, which allows authenticated users with Contributor-level permissions or higher to extract sensitive data, including authentication cookies of other users on the site. This exposure can lead to privilege escalation, as attackers can hijack sessions or impersonate higher-privilege users. The vulnerability requires no user interaction beyond authentication at the Contributor level, making it relatively easy to exploit remotely over the network (AV:N). The attack complexity is low (AC:L), and the scope is unchanged (S:U), meaning the impact is confined to the vulnerable component but affects confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). No patches are currently linked, and no known exploits are reported in the wild as of the publication date (August 19, 2025). Given that FunnelKit plugins are widely used in WordPress and WooCommerce environments for marketing automation and CRM, this vulnerability poses a significant risk to websites that rely on these plugins for customer engagement and sales funnel management.
Potential Impact
For European organizations, the impact of CVE-2025-7654 can be severe, especially for e-commerce businesses and marketing teams using WordPress with WooCommerce and FunnelKit plugins. Exposure of authentication cookies can lead to unauthorized access to user accounts, including administrative accounts, resulting in data breaches, unauthorized transactions, and manipulation of marketing campaigns or customer data. This can cause reputational damage, loss of customer trust, and potential regulatory penalties under GDPR due to unauthorized access to personal data. The ability to escalate privileges from Contributor to higher roles increases the risk of full site compromise, data tampering, and service disruption. Additionally, attackers could leverage compromised sites to distribute malware or conduct phishing campaigns, further amplifying the threat landscape for European organizations relying on these platforms.
Mitigation Recommendations
Immediate mitigation steps include restricting Contributor-level access to trusted users only and auditing existing user roles to minimize exposure. Administrators should monitor for unusual activity related to user sessions and authentication cookies. Since no official patches are currently linked, organizations should consider temporarily disabling the wf_get_cookie shortcode functionality or removing the affected FunnelKit plugins until a vendor patch is released. Implementing Web Application Firewall (WAF) rules to detect and block attempts to exploit the shortcode can reduce risk. Regularly updating WordPress core, WooCommerce, and all plugins is critical once patches become available. Additionally, enforcing multi-factor authentication (MFA) for all user accounts can limit the impact of stolen authentication cookies. Conducting thorough security reviews and penetration testing focused on privilege escalation vectors in the affected environment is recommended to identify and remediate any exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-14T17:44:54.928Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a4289bad5a09ad00f3cae9
Added to database: 8/19/2025, 7:32:43 AM
Last enriched: 8/19/2025, 7:48:06 AM
Last updated: 11/18/2025, 6:48:12 AM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-48593: Remote code execution in Google Android
UnknownCVE-2025-64734: CWE-772 Missing Release of Resource after Effective Lifetime in Gallagher T21 Reader
LowCVE-2025-52578: CWE-335 Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) in Gallagher High Sec End of Line Module
MediumCVE-2025-52457: CWE-208 Observable Timing Discrepancy in Gallagher HBUS Devices
MediumCVE-2025-8693: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel DX3300-T0 firmware
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.