CVE-2025-12353

5.3 MEDIUM

📋 TL;DR

The WPFunnels WordPress plugin has an authorization bypass vulnerability that allows unauthenticated attackers to register user accounts even when site registration is disabled. This affects all WordPress sites using WPFunnels versions up to 3.6.2. Attackers can create unauthorized accounts to potentially gain access to restricted areas.

💻 Affected Systems

Products:
  • WPFunnels - The Easiest Funnel Builder For WordPress And WooCommerce
Versions: All versions up to and including 3.6.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions, regardless of WordPress user registration settings.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers create administrative accounts, take over the WordPress site, install malware, or exfiltrate sensitive data.

🟠

Likely Case

Attackers create regular user accounts to spam, abuse resources, or use as foothold for further attacks.

🟢

If Mitigated

Attackers can create accounts but limited permissions prevent significant damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request manipulation required. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.6.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3389604/wpfunnels/trunk/public/class-wpfnl-public.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find WPFunnels plugin. 4. Click 'Update Now' if update available. 5. If no update available, manually download version 3.6.3+ from WordPress repository.

🔧 Temporary Workarounds

Disable WPFunnels plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate wpfunnels

Block registration endpoints

all

Use web application firewall to block requests to WPFunnels registration endpoints

🧯 If You Can't Patch

  • Disable user registration completely in WordPress settings
  • Implement rate limiting on registration endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > WPFunnels version. If version is 3.6.2 or lower, vulnerable.

Check Version:

wp plugin get wpfunnels --field=version

Verify Fix Applied:

After update, verify WPFunnels version is 3.6.3 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user registration activity
  • Multiple user registrations from same IP
  • Registration attempts with WPFunnels-specific parameters

Network Indicators:

  • HTTP POST requests to /wp-json/wpfnl/v1/optin with registration parameters
  • Unusual traffic to WPFunnels API endpoints

SIEM Query:

source="wordpress.log" AND "wpfnl" AND "registration" AND "user_created"

🔗 References

📤 Share & Export