VYPR
Medium severity4.3NVD Advisory· Published Dec 9, 2025· Updated Apr 27, 2026

CVE-2025-67468

CVE-2025-67468

Description

Missing Authorization vulnerability in CRM Perks Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms cf7-salesforce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms: from n/a through <= 1.4.6.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The WordPress Integration for Salesforce plugin (<=1.4.6) has a missing authorization vulnerability allowing unauthenticated attackers to exploit incorrectly configured access controls.

The vulnerability is a missing authorization issue in the WordPress plugin 'Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms' (versions up to and including 1.4.6). The plugin fails to properly enforce access control checks on certain functions, meaning that actions intended for authenticated users with specific privileges can be triggered without proper authorization. This is a classic broken access control flaw where the software does not verify that the user has the required permissions before executing a sensitive operation [1].

Exploitation does not require authentication; an attacker can send specially crafted HTTP requests to the WordPress site to invoke the vulnerable functionality. The attack surface is the plugin's exposed endpoints, which are accessible to anyone who can reach the site. No special network position or prior knowledge is needed beyond the ability to interact with the WordPress installation [1].

The impact is that an unauthenticated attacker may be able to perform actions that should be restricted to administrators, such as modifying plugin settings, accessing or altering Salesforce integration data, or other privileged operations. The CVSS v3 base score of 4.3 (Medium) reflects the limited direct impact, but the vulnerability could be chained with other issues or used in automated attacks against multiple sites [1].

Mitigation is straightforward: update the plugin to version 1.4.7 or later, which includes the necessary authorization checks. The vendor (Patchstack) recommends enabling auto-updates for vulnerable plugins. Although the issue is rated as low severity and unlikely to be exploited in isolation, similar broken access control vulnerabilities are frequently targeted in mass-exploit campaigns, so applying the patch promptly is advised [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.