Atomic Edge analysis of CVE-2025-13139 (metadata-based):
This vulnerability is a Cross-Site Request Forgery (CSRF) flaw in the SurveyJS: Drag & Drop WordPress Form Builder plugin. It affects versions up to and including 2.5.2. The vulnerability allows unauthenticated attackers to create surveys on a WordPress site by tricking an administrator into clicking a malicious link. The CVSS score of 4.3 (Medium) reflects the requirement for user interaction and the limited impact on integrity.
Atomic Edge research identifies the root cause as missing nonce validation on the `SurveyJS_AddSurvey` AJAX action. WordPress AJAX handlers require a nonce (number used once) token to verify the request originates from a legitimate user session. The plugin’s AJAX callback function for survey creation likely lacks a `check_ajax_referer()` call or a manual `wp_verify_nonce()` check. This conclusion is inferred from the CWE-352 classification and the vulnerability description, which explicitly states missing nonce validation. Without source code, this remains a logical inference based on the described attack vector.
Exploitation requires an attacker to craft a malicious web page or email containing a forged HTTP request. The request targets the WordPress admin AJAX endpoint `/wp-admin/admin-ajax.php` with the POST parameter `action` set to `SurveyJS_AddSurvey`. The payload includes survey data parameters, such as title, questions, and settings, which the plugin processes. An attacker must lure a logged-in administrator to visit the malicious page, which automatically submits the forged request using the administrator’s session privileges. The browser sends the administrator’s cookies with the request, bypassing authentication.
Remediation requires adding proper nonce verification to the vulnerable AJAX handler. The patched version (2.5.3) likely added a `check_ajax_referer()` call or equivalent nonce check within the function hooked to the `wp_ajax_SurveyJS_AddSurvey` action. This validation ensures the request includes a valid nonce generated for the specific user and action. The fix may also include stricter capability checks, though the description focuses on the CSRF flaw. Proper nonce implementation renders forged requests invalid.
The impact is unauthorized survey creation. Attackers can create surveys with arbitrary content, potentially including phishing questions, spam, or misleading information. This compromises the integrity of the site’s data and user interactions. While the vulnerability does not directly allow data theft or remote code execution, it can damage site credibility and user trust. Successful exploitation requires an administrator to be tricked, but the attack is silent and requires no feedback from the victim.







