CVE-2025-30863

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in CRM Perks Integration for Google Sheets and Contact Form 7, WPForms, Elementor, Ninja Forms allows attackers to trick authenticated administrators into performing unintended actions. It affects WordPress sites using this plugin from any version up to 1.0.9. Attackers could modify plugin settings or potentially perform other administrative actions.

💻 Affected Systems

Products:
  • CRM Perks Integration for Google Sheets and Contact Form 7, WPForms, Elementor, Ninja Forms
Versions: n/a through 1.0.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with this specific plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could reconfigure the plugin to send form submissions to malicious endpoints, potentially harvesting sensitive user data submitted through forms.

🟠

Likely Case

Attackers modify plugin settings to disrupt functionality or redirect form data, causing data integrity issues and potential data exposure.

🟢

If Mitigated

With proper CSRF protections and user awareness, impact is limited to temporary configuration changes that can be reverted.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into clicking a malicious link or visiting a crafted page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.10 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/integration-for-contact-form-7-and-google-sheets/vulnerability/wordpress-integration-for-google-sheets-and-contact-form-7-wpforms-elementor-ninja-forms-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Integration for Google Sheets and Contact Form 7, WPForms, Elementor, Ninja Forms'. 4. Click 'Update Now' if available, or download version 1.0.10+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate integration-for-contact-form-7-and-google-sheets

🧯 If You Can't Patch

  • Implement CSRF tokens manually in plugin forms if you have development capabilities
  • Restrict admin panel access to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Integration for Google Sheets and Contact Form 7, WPForms, Elementor, Ninja Forms' version. If version is 1.0.9 or lower, you are vulnerable.

Check Version:

wp plugin get integration-for-contact-form-7-and-google-sheets --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 1.0.10 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected plugin configuration changes in WordPress logs
  • Multiple failed CSRF token validations

Network Indicators:

  • Unusual outbound connections from WordPress to unexpected Google Sheets or form submission endpoints

SIEM Query:

source="wordpress" AND (event="plugin_updated" OR event="option_updated") AND plugin="integration-for-contact-form-7-and-google-sheets"

🔗 References

📤 Share & Export