CVE-2025-5692
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-02

Last updated on: 2025-09-30

Assigner: Wordfence

Description
The Lead Form Data Collection to CRM plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the ~/includes/LB_admin_ajax.php file in all versions up to, and including, 3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform several actions like updating settings. Initially this CVE was assigned specifically to all AJAX actions and the doFieldAjaxAction() function, however it was determined that CVE-2025-47690 is assigned to the doFieldAjaxAction() function that leads to arbitrary options updates.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-02
Last Modified
2025-09-30
Generated
2026-05-07
AI Q&A
2025-07-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
smackcoders lead_form_data_collection_to_crm to 3.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Lead Form Data Collection to CRM plugin for WordPress, where a missing capability check in the doFieldAjaxAction() function allows authenticated users with Subscriber-level access or higher to modify data they should not be able to. This enables attackers to update arbitrary options on the WordPress site, including changing the default user role to administrator and enabling user registration, which can lead to attackers gaining administrative access. Other AJAX actions related to plugin settings are also insufficiently protected and exploitable.


How can this vulnerability impact me? :

The vulnerability can lead to privilege escalation, allowing attackers with low-level access to gain administrative control over the WordPress site. This can result in unauthorized changes to site settings, creation of administrative users, and potentially full compromise of the website, impacting its integrity, availability, and confidentiality.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart