Unauthorized AJAX Action in Doppler Forms Plugin for WordPress
CVE-2025-9544
Key Information:
- Vendor
WordPress
- Status
- Vendor
- CVE Published:
- 29 October 2025
Badges
What is CVE-2025-9544?
The Doppler Forms WordPress plugin prior to version 2.5.1 contains an improper authentication vulnerability. This security issue arises from the plugin's failure to verify user capabilities when registering an AJAX action called install_extension. Consequently, any authenticated user, even those with the lowest permission level (Subscriber role), can execute this action without adequate safeguards. This allows these users to potentially install and activate additional components of the Doppler Forms plugin, albeit limited to those explicitly whitelisted by the primary plugin. Such a vulnerability could lead to unauthorized modifications and adversely affect site integrity.
Affected Version(s)
Doppler Forms 0 <= 2.5.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved