CVE-2025-13006
BaseFortify
Publication date: 2025-12-05
Last updated on: 2025-12-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wpeka | surveyfunnel_lite | 1.1.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the SurveyFunnel β Survey Plugin for WordPress allows unauthenticated attackers to access sensitive information by exploiting unprotected REST API endpoints (/wp-json/surveyfunnel/v2/). This means attackers can extract sensitive data from survey responses without needing to log in or have any privileges.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized disclosure of sensitive survey response data, potentially compromising the privacy of individuals who submitted surveys. It may result in data breaches, loss of trust, and harm to affected individuals or organizations.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthenticated attackers to access sensitive survey response data, including potentially personally identifiable information (PII). Such unauthorized exposure of sensitive data can lead to non-compliance with data protection regulations like GDPR and HIPAA, which require strict controls on access to personal and sensitive information. Therefore, the vulnerability poses a risk to compliance with these standards by enabling data breaches through unprotected REST API endpoints. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking if the vulnerable REST API endpoints are accessible without authentication. For example, you can use curl commands to send unauthenticated GET requests to the following endpoints on your WordPress site: 1. curl -X GET https://your-wordpress-site.com/wp-json/surveyfunnel/v2/fsd 2. curl -X GET https://your-wordpress-site.com/wp-json/surveyfunnel/v2/responses 3. curl -X GET https://your-wordpress-site.com/wp-json/surveyfunnel/v2/responses/{survey_id} 4. curl -X GET https://your-wordpress-site.com/wp-json/surveyfunnel/v2/surveys 5. curl -X GET https://your-wordpress-site.com/wp-json/surveyfunnel/v2/surveys/survey_id={survey_id} If these endpoints return survey or response data without requiring authentication, your system is vulnerable. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1. Update the SurveyFunnel β Survey Plugin for WordPress to a version later than 1.1.5 where this vulnerability is fixed. 2. If an update is not immediately available, restrict access to the vulnerable REST API endpoints by implementing authentication or IP-based access controls on your web server or firewall. 3. Disable or remove the SurveyFunnel plugin temporarily if you do not require its functionality until a patch is applied. 4. Monitor your logs for any unauthorized access to the /wp-json/surveyfunnel/v2/ endpoints to detect exploitation attempts. [1]