CVE-2025-1562

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to install arbitrary WordPress plugins on sites running the vulnerable FunnelKit plugin. Attackers can leverage this to upload malicious plugins that further compromise the site. All WordPress installations using the affected plugin versions are at risk.

💻 Affected Systems

Products:
  • FunnelKit (formerly WooFunnels) - Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation
Versions: All versions up to and including 3.5.3
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin active. No special configuration needed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover through installation of backdoor plugins leading to data theft, ransomware deployment, or persistent access for attackers.

🟠

Likely Case

Installation of malicious plugins for cryptocurrency mining, spam distribution, credential theft, or SEO spam injection.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and file integrity monitoring are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has simple exploitation due to missing capability checks and weak nonce validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.4 or later

Vendor Advisory: https://wordpress.org/plugins/wp-marketing-automations/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'FunnelKit' plugin
4. Click 'Update Now' if available
5. If not available, download version 3.5.4+ from WordPress.org and manually update

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the FunnelKit plugin until patched

wp plugin deactivate wp-marketing-automations

Web Application Firewall rule

all

Block requests to the vulnerable API endpoint

Block POST requests to /wp-json/funnelkit/*/install_or_activate_addon_plugins

🧯 If You Can't Patch

  • Implement strict file upload restrictions and disable plugin installation via wp-config.php
  • Deploy network segmentation and restrict outbound connections from web servers

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → FunnelKit version. If version is 3.5.3 or lower, you are vulnerable.

Check Version:

wp plugin get wp-marketing-automations --field=version

Verify Fix Applied:

Verify plugin version is 3.5.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-json/funnelkit/* endpoints
  • Unexpected plugin installations in WordPress logs
  • Multiple failed plugin installation attempts

Network Indicators:

  • Outbound connections to suspicious plugin repositories
  • Unusual traffic patterns to WordPress REST API endpoints

SIEM Query:

source="wordpress.log" AND ("install_or_activate_addon_plugins" OR "funnelkit/api")

🔗 References

📤 Share & Export