The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.12.0. This is due to missing or incorrect nonce validation on the maybe_opt_in() function. This makes it possible for unauthenticated attackers to opt an affected site into usage statistics collection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Configurations
History
23 Dec 2025, 18:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://plugins.trac.wordpress.org/browser/ninja-forms/trunk/lib/NF_Tracking.php - Product | |
| References | () https://plugins.trac.wordpress.org/changeset/3365881/ninja-forms/trunk?contextall=1&old=3362375&old_path=%2Fninja-forms%2Ftrunk#file6 - Patch | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/a2f118fc-d99a-4713-865e-2da7a9e20db5?source=cve - Third Party Advisory | |
| First Time |
Ninjaforms
Ninjaforms ninja Forms |
|
| CPE | cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:* |
27 Sep 2025, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-27 03:15
Updated : 2025-12-23 18:57
NVD link : CVE-2025-10499
Mitre link : CVE-2025-10499
CVE.ORG link : CVE-2025-10499
JSON object : View
Products Affected
ninjaforms
- ninja_forms
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
