CVE-2025-64384

6.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the JetFormBuilder WordPress plugin that allows attackers to bypass access controls. Attackers can exploit incorrectly configured security levels to perform unauthorized actions. All WordPress sites using JetFormBuilder versions up to and including 3.5.3 are affected.

💻 Affected Systems

Products:
  • JetFormBuilder WordPress Plugin
Versions: All versions through 3.5.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with JetFormBuilder plugin enabled

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise through privilege escalation, data manipulation, or unauthorized administrative actions

🟠

Likely Case

Unauthorized form submissions, data access, or content modification by authenticated users

🟢

If Mitigated

Limited impact with proper user role validation and access controls in place

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing and vulnerable to remote exploitation
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have any level of access

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but minimal technical skill needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.4 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/jetformbuilder/vulnerability/wordpress-jetformbuilder-plugin-3-5-3-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find JetFormBuilder and click 'Update Now'. 4. Verify version is 3.5.4 or higher.

🔧 Temporary Workarounds

Disable JetFormBuilder Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate jetformbuilder

Restrict User Access

all

Limit user roles and permissions to minimize attack surface

🧯 If You Can't Patch

  • Implement strict access controls and user role validation
  • Monitor for suspicious form submissions and user activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > JetFormBuilder version

Check Version:

wp plugin get jetformbuilder --field=version

Verify Fix Applied:

Confirm JetFormBuilder version is 3.5.4 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized form submissions
  • User role escalation attempts
  • Access to restricted form endpoints

Network Indicators:

  • Unusual POST requests to JetFormBuilder endpoints
  • Requests bypassing expected authorization headers

SIEM Query:

source="wordpress.log" AND ("jetformbuilder" AND ("unauthorized" OR "access denied" OR "permission"))

🔗 References

📤 Share & Export