CVE-2025-7654: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
Multiple FunnelKit plugins are vulnerable to Sensitive Information Exposure via the wf_get_cookie shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including authentication cookies of other site users, which may make privilege escalation possible. Please note both FunnelKit – Funnel Builder for WooCommerce Checkout AND FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce are affected by this.
AI Analysis
Technical Summary
CVE-2025-7654 is a high-severity vulnerability (CVSS 8.8) affecting multiple FunnelKit plugins developed by amans2k, specifically FunnelKit – Funnel Builder for WooCommerce Checkout and FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce. The vulnerability is classified under CWE-200, which involves the exposure of sensitive information to unauthorized actors. The root cause lies in the improper handling of the wf_get_cookie shortcode, which allows authenticated users with Contributor-level permissions or higher to extract sensitive data, including authentication cookies of other users on the site. This exposure can lead to privilege escalation, as attackers can hijack sessions or impersonate higher-privilege users. The vulnerability requires no user interaction beyond authentication at the Contributor level, making it relatively easy to exploit remotely over the network (AV:N). The attack complexity is low (AC:L), and the scope is unchanged (S:U), meaning the impact is confined to the vulnerable component but affects confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). No patches are currently linked, and no known exploits are reported in the wild as of the publication date (August 19, 2025). Given that FunnelKit plugins are widely used in WordPress and WooCommerce environments for marketing automation and CRM, this vulnerability poses a significant risk to websites that rely on these plugins for customer engagement and sales funnel management.
Potential Impact
For European organizations, the impact of CVE-2025-7654 can be severe, especially for e-commerce businesses and marketing teams using WordPress with WooCommerce and FunnelKit plugins. Exposure of authentication cookies can lead to unauthorized access to user accounts, including administrative accounts, resulting in data breaches, unauthorized transactions, and manipulation of marketing campaigns or customer data. This can cause reputational damage, loss of customer trust, and potential regulatory penalties under GDPR due to unauthorized access to personal data. The ability to escalate privileges from Contributor to higher roles increases the risk of full site compromise, data tampering, and service disruption. Additionally, attackers could leverage compromised sites to distribute malware or conduct phishing campaigns, further amplifying the threat landscape for European organizations relying on these platforms.
Mitigation Recommendations
Immediate mitigation steps include restricting Contributor-level access to trusted users only and auditing existing user roles to minimize exposure. Administrators should monitor for unusual activity related to user sessions and authentication cookies. Since no official patches are currently linked, organizations should consider temporarily disabling the wf_get_cookie shortcode functionality or removing the affected FunnelKit plugins until a vendor patch is released. Implementing Web Application Firewall (WAF) rules to detect and block attempts to exploit the shortcode can reduce risk. Regularly updating WordPress core, WooCommerce, and all plugins is critical once patches become available. Additionally, enforcing multi-factor authentication (MFA) for all user accounts can limit the impact of stolen authentication cookies. Conducting thorough security reviews and penetration testing focused on privilege escalation vectors in the affected environment is recommended to identify and remediate any exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-7654: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
Description
Multiple FunnelKit plugins are vulnerable to Sensitive Information Exposure via the wf_get_cookie shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including authentication cookies of other site users, which may make privilege escalation possible. Please note both FunnelKit – Funnel Builder for WooCommerce Checkout AND FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce are affected by this.
AI-Powered Analysis
Technical Analysis
CVE-2025-7654 is a high-severity vulnerability (CVSS 8.8) affecting multiple FunnelKit plugins developed by amans2k, specifically FunnelKit – Funnel Builder for WooCommerce Checkout and FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce. The vulnerability is classified under CWE-200, which involves the exposure of sensitive information to unauthorized actors. The root cause lies in the improper handling of the wf_get_cookie shortcode, which allows authenticated users with Contributor-level permissions or higher to extract sensitive data, including authentication cookies of other users on the site. This exposure can lead to privilege escalation, as attackers can hijack sessions or impersonate higher-privilege users. The vulnerability requires no user interaction beyond authentication at the Contributor level, making it relatively easy to exploit remotely over the network (AV:N). The attack complexity is low (AC:L), and the scope is unchanged (S:U), meaning the impact is confined to the vulnerable component but affects confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). No patches are currently linked, and no known exploits are reported in the wild as of the publication date (August 19, 2025). Given that FunnelKit plugins are widely used in WordPress and WooCommerce environments for marketing automation and CRM, this vulnerability poses a significant risk to websites that rely on these plugins for customer engagement and sales funnel management.
Potential Impact
For European organizations, the impact of CVE-2025-7654 can be severe, especially for e-commerce businesses and marketing teams using WordPress with WooCommerce and FunnelKit plugins. Exposure of authentication cookies can lead to unauthorized access to user accounts, including administrative accounts, resulting in data breaches, unauthorized transactions, and manipulation of marketing campaigns or customer data. This can cause reputational damage, loss of customer trust, and potential regulatory penalties under GDPR due to unauthorized access to personal data. The ability to escalate privileges from Contributor to higher roles increases the risk of full site compromise, data tampering, and service disruption. Additionally, attackers could leverage compromised sites to distribute malware or conduct phishing campaigns, further amplifying the threat landscape for European organizations relying on these platforms.
Mitigation Recommendations
Immediate mitigation steps include restricting Contributor-level access to trusted users only and auditing existing user roles to minimize exposure. Administrators should monitor for unusual activity related to user sessions and authentication cookies. Since no official patches are currently linked, organizations should consider temporarily disabling the wf_get_cookie shortcode functionality or removing the affected FunnelKit plugins until a vendor patch is released. Implementing Web Application Firewall (WAF) rules to detect and block attempts to exploit the shortcode can reduce risk. Regularly updating WordPress core, WooCommerce, and all plugins is critical once patches become available. Additionally, enforcing multi-factor authentication (MFA) for all user accounts can limit the impact of stolen authentication cookies. Conducting thorough security reviews and penetration testing focused on privilege escalation vectors in the affected environment is recommended to identify and remediate any exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-14T17:44:54.928Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a4289bad5a09ad00f3cae9
Added to database: 8/19/2025, 7:32:43 AM
Last enriched: 8/19/2025, 7:48:06 AM
Last updated: 8/19/2025, 7:48:06 AM
Views: 2
Related Threats
CVE-2025-8567: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in posimyththemes Nexter Blocks – WordPress Gutenberg Blocks & 1000+ Starter Templates
MediumCVE-2025-41689: CWE-306 Missing Authentication for Critical Function in Wiesemann & Theis Motherbox 3
MediumCVE-2025-41685: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in SMA ennexos.sunnyportal.com
MediumCVE-2025-8723: CWE-94 Improper Control of Generation of Code ('Code Injection') in mecanik Cloudflare Image Resizing – Optimize & Accelerate Your Images
CriticalCVE-2025-8622: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webaware Flexible Map
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.