Insecure Direct Object Reference in Ninja Forms Plugin for WordPress
CVE-2025-11924

7.5HIGH

What is CVE-2025-11924?

The Ninja Forms plugin for WordPress is susceptible to Insecure Direct Object Reference, affecting versions through 3.13.2. The vulnerability arises when the plugin fails to adequately verify user authorization before exposing form metadata and submission content via its ninja-forms-views REST endpoints. Consequently, unauthenticated attackers can exploit this issue to access arbitrary form definitions and submission records if they can acquire a leaked bearer token while loading any page with the Submissions Table block. Note that a patch was provided in version 3.13.1; however, it inadvertently created a new REST API endpoint that allowed the generation of valid bearer tokens for any form ID, rendering the patch ineffective.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Ninja Forms – The Contact Form Builder That Grows With You * <= 3.13.2

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lucas Montes
Marcin Dudek
.