Get Started
CVE April 24, 2026 4 min read

CVE-2025-14072: Ninja Forms Access Token Generation Vulnerability

The Ninja Forms plugin for WordPress has an access token generation issue. It is tracked as CVE-2025-14072 with a CVSS score of 5.3 (Medium). This vulnerability affects the plugin’s OAuth-based integration system. It allows an unauthenticated attacker to generate valid access tokens under certain conditions.

CVE-2025-14072 Ninja Forms file upload: What Is Ninja Forms?

Ninja Forms is a popular form builder for WordPress. It has over 800,000 active installations. It powers contact forms, registration forms, payment forms, and various integrations. The plugin’s API and integration system relies on OAuth tokens. These authenticate third-party services like email marketing platforms, CRM systems, and payment gateways. Access tokens let external services interact with your form data securely – or at least, they should.

The vulnerability targets the token generation mechanism in Ninja Forms API. Under normal circumstances, generating a valid access token requires proper authentication. But CVE-2025-14072 reveals that the token endpoint does not always verify the requester’s identity correctly. Anyone who knows the right endpoint URL can potentially request a token.

CVE-2025-14072 Ninja Forms file upload: Technical Details of CVE-2025-14072

The vulnerability stems from a missing capability check. It affects the token generation endpoint of Ninja Forms. The endpoint for issuing OAuth tokens does not validate whether the requesting user has the required permissions. In secure implementations, token generation requires administrator-level access. Tokens grant significant privileges to whoever holds them.

Because the check is missing, an attacker can access the endpoint without being logged in. They can trigger token generation. The token then grants API access equivalent to a user with form management capabilities. The attacker can read form submissions, modify form settings, or exfiltrate data collected through your forms.

The vulnerability carries a CVSS score of 5.3 (Medium). The attack requires specific knowledge of the endpoint structure. Certain conditions must be met for successful exploitation. However, researchers note these conditions are easily satisfied in many configurations. The actual risk is higher than the CVSS score suggests.

What an Attacker Can Do With a Stolen Token

An access token in Ninja Forms is a key to your form data. Once an attacker generates a valid token, they can make API requests as if they were an authorized user. The impact depends on what permissions the token carries. In typical setups, a token allows reading all form submissions. It lets attackers download uploaded files, modify form structures, and even trigger form actions like email notifications or payment processing.

For a business using Ninja Forms for order forms, registration, or contact forms, a compromised token means data exposure. Names, email addresses, phone numbers, and sometimes payment information become accessible. This is not merely a technical problem – it is a compliance and reputation issue. If you store sensitive data through Ninja Forms and it leaks, you could face GDPR or CCPA penalties.

The attack does not require sophisticated tools. An attacker can use simple curl requests or a browser’s developer tools. The fact it is exploitable without authentication makes it dangerous for sites not yet updated.

Affected Versions

CVE-2025-14072 affects Ninja Forms versions prior to 3.8.25. Any site running Ninja Forms below this version is vulnerable. The patch was released in the 3.8.25 update. It addresses the missing capability check in the token generation endpoint. You can download the latest version from the WordPress plugin repository or update from your WordPress admin dashboard under Plugins → Installed Plugins.

If you use a managed WordPress hosting provider like WP Engine or Kinsta, they may have updated the plugin for you. Check your plugins page to confirm you are running 3.8.25 or higher.

How to Protect Your Site

The most important step is updating Ninja Forms to version 3.8.25 or later. This is the only change that directly patches the vulnerability. There are additional measures you can take to reduce your risk even before updating:

  • Restrict API access: Block access to Ninja Forms API endpoints from non-administrator IP addresses. Use your .htaccess file or a web application firewall. The endpoint for token generation typically lives under /wp-json/ninja-forms/ or a similar path.
  • Monitor API logs: Check your server access logs for unexpected requests to Ninja Forms API endpoints. Watch especially for requests from unknown IP addresses. Multiple requests to the token endpoint from the same IP in a short period is a red flag.
  • Audit existing tokens: If you use Ninja Forms integrations, review which third-party services have active tokens. Revoke any tokens you do not recognize or that belong to unused services. You can do this from within the Ninja Forms settings page.
  • Enable form submission logging: Track who is accessing your form data. If you notice unusual patterns – like a sudden spike in API requests or form exports – investigate immediately.

How Trusti Security Can Help

While Trusti Security does not have a Ninja Forms-specific integration, its Activity Logging module tracks all API requests to your WordPress site. This includes attempts to access plugin endpoints. If an attacker tries to exploit CVE-2025-14072 on your site, the repeated requests to the token endpoint will appear in your activity log. This gives you early warning of the attack. Combined with the Firewall module’s ability to block suspicious IP addresses, you can stop exploitation attempts before they succeed. If you are not using Ninja Forms, Trusti Security’s plugin vulnerability scanner can alert you to outdated plugins across your entire installation.

The Bottom Line

CVE-2025-14072 is a medium-severity vulnerability. It becomes high-impact in practice because many sites use Ninja Forms for sensitive data collection. Update to version 3.8.25 immediately. If you cannot update right away, restrict access to the affected API endpoint. Monitor your logs for suspicious activity. Form plugins handle some of the most sensitive data on your site – contact information, order details, file upload CVE-2026-1555 WebStacks – and any vulnerability in a form plugin should be treated as urgent regardless of its CVSS score.

Related Articles