CVE-2025-5692

6.3 MEDIUM

📋 TL;DR

The Lead Form Data Collection to CRM WordPress plugin has a missing capability check vulnerability that allows authenticated attackers with Subscriber-level access or higher to perform unauthorized administrative actions like updating settings. This affects all versions up to and including 3.1. The vulnerability is in the LB_admin_ajax.php file.

💻 Affected Systems

Products:
  • Lead Form Data Collection to CRM WordPress plugin
Versions: All versions up to and including 3.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Attackers need at least Subscriber-level WordPress access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify plugin settings, potentially compromising form data collection, altering CRM integrations, or enabling further attacks through configuration changes.

🟠

Likely Case

Unauthorized users modify plugin settings, disrupt form functionality, or alter data collection workflows without proper authorization.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized setting changes that can be detected and reverted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses simple AJAX requests. The vulnerability is well-documented with specific file references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.1

Vendor Advisory: https://wordpress.org/plugins/wp-leads-builder-any-crm/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Lead Form Data Collection to CRM'. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate wp-leads-builder-any-crm

Access Restriction

linux

Restrict access to /wp-admin/admin-ajax.php for non-administrators

# Add to .htaccess for Apache: RewriteCond %{REQUEST_URI} ^/wp-admin/admin-ajax\.php$ RewriteCond %{HTTP_COOKIE} !wordpress_logged_in_.*admin [NC] RewriteRule .* - [F,L]

🧯 If You Can't Patch

  • Remove Subscriber and higher role access from untrusted users
  • Implement web application firewall rules to block suspicious AJAX requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins. If version is 3.1 or lower, system is vulnerable.

Check Version:

wp plugin get wp-leads-builder-any-crm --field=version

Verify Fix Applied:

Verify plugin version is higher than 3.1. Test with Subscriber account that AJAX actions requiring admin capabilities fail.

📡 Detection & Monitoring

Log Indicators:

  • Multiple AJAX requests to /wp-admin/admin-ajax.php from non-admin users
  • Plugin setting changes from low-privilege user accounts
  • Unusual activity in LB_admin_ajax.php access logs

Network Indicators:

  • POST requests to admin-ajax.php with action parameters related to the vulnerable plugin from non-admin IPs

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND ("wp-leads-builder" OR "LB_admin_ajax") AND NOT user_role="administrator"

🔗 References

📤 Share & Export