Unauthorized AJAX Action in Doppler Forms Plugin for WordPress
CVE-2025-9544

6.5MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
29 October 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-9544?

The Doppler Forms WordPress plugin prior to version 2.5.1 contains an improper authentication vulnerability. This security issue arises from the plugin's failure to verify user capabilities when registering an AJAX action called install_extension. Consequently, any authenticated user, even those with the lowest permission level (Subscriber role), can execute this action without adequate safeguards. This allows these users to potentially install and activate additional components of the Doppler Forms plugin, albeit limited to those explicitly whitelisted by the primary plugin. Such a vulnerability could lead to unauthorized modifications and adversely affect site integrity.

Affected Version(s)

Doppler Forms 0 <= 2.5.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Khaled Alenazi (Nxploited)
WPScan
.