Description
The WPFunnels – The Easiest Funnel Builder For WordPress And WooCommerce To Collect Leads And Increase Sales plugin for WordPress is vulnerable to unauthorized user registration in all versions up to, and including, 3.6.2. This is due to the plugin relying on a user controlled value 'optin_allow_registration' to determine if user registration is allowed, instead of the site-specific setting. This makes it possible for unauthenticated attackers to register new user accounts, even when user registration is disabled.
Published: 2025-11-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized account registration
Action: Apply Patch
AI Analysis

Impact

The vulnerability exists because the WPFunnels plugin trusts a user‑controlled setting called 'optin_allow_registration' to decide whether new users may register. When this flag is set to true, the plugin skips the site‑wide registration restriction and allows any visitor to create an account without authentication. This is a privilege escalation flaw (CWE‑639) that enables attackers to generate accounts that could be used for spam, phishing, or further exploitation of the WordPress site.

Affected Systems

The affected product is the WordPress plugin WPFunnels – Funnel Builder for WooCommerce with Checkout & One Click Upsell, versions up to and including 3.6.2. Sites that have installed any of these versions are susceptible; no other vendors or product lines are listed.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. The EPSS score is less than 1 %, showing that exploitation is unlikely to be seen widely, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the most probable attack path requires an unauthenticated user to submit a registration request that includes 'optin_allow_registration' set to a truthy value; no special privileges are needed. If a site protects itself by disabling WordPress registration or limiting account creation, the impact is mitigated but the flaw remains present if the plugin logic is not updated.

Generated by OpenCVE AI on April 22, 2026 at 13:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WPFunnels plugin to a version that fixes the flaw.
  • If an immediate update is not possible, temporarily disable WordPress user registration in the Settings → General panel to prevent new accounts from being created.
  • Additionally, set the 'optin_allow_registration' flag to false via the plugin settings or directly in the database to ensure the plugin cannot override the site registration setting.

Generated by OpenCVE AI on April 22, 2026 at 13:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 10 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 10 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Getwpfunnels
Getwpfunnels wpfunnels
Wordpress
Wordpress wordpress
Vendors & Products Getwpfunnels
Getwpfunnels wpfunnels
Wordpress
Wordpress wordpress

Sat, 08 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The WPFunnels – The Easiest Funnel Builder For WordPress And WooCommerce To Collect Leads And Increase Sales plugin for WordPress is vulnerable to unauthorized user registration in all versions up to, and including, 3.6.2. This is due to the plugin relying on a user controlled value 'optin_allow_registration' to determine if user registration is allowed, instead of the site-specific setting. This makes it possible for unauthenticated attackers to register new user accounts, even when user registration is disabled.
Title WPFunnels <= 3.6.2 - Unauthorized User Registration
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Getwpfunnels Wpfunnels
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:51:41.520Z

Reserved: 2025-10-27T15:11:29.679Z

Link: CVE-2025-12353

cve-icon Vulnrichment

Updated: 2025-11-10T19:55:30.136Z

cve-icon NVD

Status : Deferred

Published: 2025-11-08T04:15:45.410

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12353

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:00:18Z

Weaknesses