CVE-2025-1562
📋 TL;DR
This vulnerability allows unauthenticated attackers to install arbitrary WordPress plugins on sites running the vulnerable FunnelKit plugin. Attackers can leverage this to upload malicious plugins that further compromise the site. All WordPress installations using the affected plugin versions are at risk.
💻 Affected Systems
- FunnelKit (formerly WooFunnels) - Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete site takeover through installation of backdoor plugins leading to data theft, ransomware deployment, or persistent access for attackers.
Likely Case
Installation of malicious plugins for cryptocurrency mining, spam distribution, credential theft, or SEO spam injection.
If Mitigated
Limited impact if proper network segmentation, web application firewalls, and file integrity monitoring are in place.
🎯 Exploit Status
The vulnerability requires no authentication and has simple exploitation due to missing capability checks and weak nonce validation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.5.4 or later
Vendor Advisory: https://wordpress.org/plugins/wp-marketing-automations/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'FunnelKit' plugin
4. Click 'Update Now' if available
5. If not available, download version 3.5.4+ from WordPress.org and manually update
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the FunnelKit plugin until patched
wp plugin deactivate wp-marketing-automations
Web Application Firewall rule
allBlock requests to the vulnerable API endpoint
Block POST requests to /wp-json/funnelkit/*/install_or_activate_addon_plugins
🧯 If You Can't Patch
- Implement strict file upload restrictions and disable plugin installation via wp-config.php
- Deploy network segmentation and restrict outbound connections from web servers
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → FunnelKit version. If version is 3.5.3 or lower, you are vulnerable.
Check Version:
wp plugin get wp-marketing-automations --field=version
Verify Fix Applied:
Verify plugin version is 3.5.4 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-json/funnelkit/* endpoints
- Unexpected plugin installations in WordPress logs
- Multiple failed plugin installation attempts
Network Indicators:
- Outbound connections to suspicious plugin repositories
- Unusual traffic patterns to WordPress REST API endpoints
SIEM Query:
source="wordpress.log" AND ("install_or_activate_addon_plugins" OR "funnelkit/api")
🔗 References
- https://plugins.trac.wordpress.org/browser/wp-marketing-automations/tags/2.5.0/includes/api/plugin_status/class-bwfan-api-install-and-activate-plugin.php
- https://plugins.trac.wordpress.org/browser/wp-marketing-automations/tags/2.5.0/includes/class-bwfan-db.php#L153
- https://plugins.trac.wordpress.org/changeset/3305437/wp-marketing-automations/trunk/admin/class-bwfan-admin.php
- https://plugins.trac.wordpress.org/changeset/3305437/wp-marketing-automations/trunk/includes/abstracts/class-bwfan-api-base.php
- https://plugins.trac.wordpress.org/changeset/3305437/wp-marketing-automations/trunk/includes/class-bwfan-api-loader.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/094972e6-7e02-4060-b069-e39c8cde9331?source=cve