Description
The Zigaform plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 7.6.5. This is due to the plugin exposing a public AJAX endpoint that retrieves form submission data without performing authorization checks to verify ownership or access rights. This makes it possible for unauthenticated attackers to extract sensitive form submission data including personal information, payment details, and other private data via the rocket_front_payment_seesummary action by enumerating sequential form_r_id values.
Published: 2025-12-02
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Patch Now
AI Analysis

Impact

The vulnerability arises from an unauthenticated AJAX endpoint that returns form submission information without verifying the requester's ownership or rights. The exposed data includes personal information and payment details, which could be used in identity theft or fraud. The weakness is a classic sensitive data exposure (CWE-200).

Affected Systems

Softdiscover's Zigaform – Price Calculator & Cost Estimation Form Builder Lite for WordPress, versions up to and including 7.6.5. Users running those releases are at risk.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, while the EPSS score of less than 1% reflects a low but non‑zero probability of exploitation. The endpoint can be accessed by simply requesting the rocket_front_payment_seesummary action and incrementing sequential form_r_id values, so a threat actor could discover multiple records without any credentials. The vulnerability is not currently cataloged by CISA as a known exploited variant.

Generated by OpenCVE AI on April 21, 2026 at 17:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Zigaform plugin to the latest release that removes or secures the rocket_front_payment_seesummary endpoint.
  • Restrict access to the AJAX endpoint so that only authenticated users with appropriate permissions can invoke it, using WordPress capabilities checks or server‑side access controls.
  • If an immediate update is not feasible, employ a quick patch by editing the plugin code to disable the endpoint or add an authentication check before returning data.

Generated by OpenCVE AI on April 21, 2026 at 17:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 03 Dec 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Softdiscover
Softdiscover zigaform
Wordpress
Wordpress wordpress
Vendors & Products Softdiscover
Softdiscover zigaform
Wordpress
Wordpress wordpress

Tue, 02 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 02 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description The Zigaform plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 7.6.5. This is due to the plugin exposing a public AJAX endpoint that retrieves form submission data without performing authorization checks to verify ownership or access rights. This makes it possible for unauthenticated attackers to extract sensitive form submission data including personal information, payment details, and other private data via the rocket_front_payment_seesummary action by enumerating sequential form_r_id values.
Title Zigaform <= 7.6.5 - Unauthenticated Form Submission Data Disclosure in rocket_front_payment_seesummary AJAX Endpoint
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Softdiscover Zigaform
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:50:08.829Z

Reserved: 2025-11-25T21:12:12.817Z

Link: CVE-2025-13696

cve-icon Vulnrichment

Updated: 2025-12-02T14:02:04.600Z

cve-icon NVD

Status : Deferred

Published: 2025-12-02T08:16:00.490

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13696

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:00:11Z

Weaknesses