Description
The User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `maybe_load_onboarding_wizard` function in all versions up to, and including, 1.8.0. This makes it possible for unauthenticated attackers to access the onboarding wizard page and view configuration information including the administrator email address.
Published: 2025-10-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Information Disclosure
Action: Update Plugin
AI Analysis

Impact

The User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds WordPress plugin contains a missing capability check in the maybe_load_onboarding_wizard function. This flaw allows unauthenticated attackers to access the onboarding wizard page, where configuration data such as the administrator email can be viewed. The vulnerability is a classic example of missing authorization (CWE‑862) and results in plain information disclosure without enabling further privileges or compromising the system.

Affected Systems

All installations of the User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds plugin with versions 1.8.0 or earlier are affected. The flaw exists in the private onboarding wizard component accessed through WordPress admin URLs.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Attackers can trigger the flaw by sending a simple HTTP request to the exposed onboarding wizard page, which is publicly accessible without authentication. Because no authentication or additional permissions are required, the attack can be performed from any remote location, though the impact is limited to the disclosure of configuration data.

Generated by OpenCVE AI on April 22, 2026 at 12:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest plugin update that removes the missing capability check.
  • Restrict access to the WordPress admin area with network or web‑application firewall rules to block unauthenticated requests to the onboarding wizard URL.
  • Temporarily disable the onboarding wizard feature or remove its endpoint until the plugin is updated.

Generated by OpenCVE AI on April 22, 2026 at 12:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Mon, 27 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 25 Oct 2025 05:45:00 +0000

Type Values Removed Values Added
Description The User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `maybe_load_onboarding_wizard` function in all versions up to, and including, 1.8.0. This makes it possible for unauthenticated attackers to access the onboarding wizard page and view configuration information including the administrator email address.
Title User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds <= 1.8.0 - Missing Authorization to Information Disclosure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:06:42.896Z

Reserved: 2025-09-18T15:41:28.436Z

Link: CVE-2025-10694

cve-icon Vulnrichment

Updated: 2025-10-27T15:57:33.503Z

cve-icon NVD

Status : Deferred

Published: 2025-10-25T06:15:32.620

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10694

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T13:00:09Z

Weaknesses