ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

We are a product-led company known for popular solutions such as Astra Theme, Spectra, ZipWP, Starter Templates, Ultimate Addons, CartFlows, SureCart, SureTriggers, SureMembers, SureFeedback, LatePoint, Convert Pro, Schema Pro, and more. At Brainstorm Force, our mission is simple: to unlock the power of the Internet for small businesses. Over 5 million businesses worldwide trust our innovative software to elevate their online presence. As pioneers in our field, we are honored to be recognized as thought leaders, guiding the industry forward through our pursuit of innovation. With a diverse team of over 150+ talented individuals spanning 21+ countries, we bring together unique perspectives and expertise to deliver unparalleled solutions. We're hiring! Join our remote team on our mission to unlock the power of the Internet for small businesses. Together, let's shape the future of the Internet and empower small businesses to thrive like never before.

Brainstorm Force A.I CyberSecurity Scoring

Brainstorm Force

Company Details

Linkedin ID:

brainstorm-force

Employees number:

131

Number of followers:

14,035

NAICS:

5112

Industry Type:

Software Development

Homepage:

brainstormforce.com

IP Addresses:

0

Company ID:

BRA_2582543

Scan Status:

In-progress

AI scoreBrainstorm Force Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/brainstorm-force.jpeg
Brainstorm Force Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreBrainstorm Force Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/brainstorm-force.jpeg
Brainstorm Force Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Brainstorm Force Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Brainstorm ForceVulnerability8544/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A critical security vulnerability, identified as CVE-2025-3102, was discovered in the SureTriggers WordPress plugin developed by Brainstorm Force, affecting over 100,000 websites. The flaw enables attackers to bypass authentication and create unauthorized administrator accounts via the plugin's improperly validated REST API endpoint. Exploitation of this vulnerability leads to full site compromise, with potential for backdoors, malware upload, phishing redirects, and spam content injection. After being reported through Wordfence's Bug Bounty Program, a patched version 1.0.79 was released to address this significant oversight in security.

Brainstorm Force
Vulnerability
Severity: 85
Impact: 4
Seen: 4/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: A critical security vulnerability, identified as CVE-2025-3102, was discovered in the SureTriggers WordPress plugin developed by Brainstorm Force, affecting over 100,000 websites. The flaw enables attackers to bypass authentication and create unauthorized administrator accounts via the plugin's improperly validated REST API endpoint. Exploitation of this vulnerability leads to full site compromise, with potential for backdoors, malware upload, phishing redirects, and spam content injection. After being reported through Wordfence's Bug Bounty Program, a patched version 1.0.79 was released to address this significant oversight in security.

Ailogo

Brainstorm Force Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Brainstorm Force

Incidents vs Software Development Industry Average (This Year)

Brainstorm Force has 132.56% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Brainstorm Force has 56.25% more incidents than the average of all companies with at least one recorded incident.

Incident Types Brainstorm Force vs Software Development Industry Avg (This Year)

Brainstorm Force reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Brainstorm Force (X = Date, Y = Severity)

Brainstorm Force cyber incidents detection timeline including parent company and subsidiaries

Brainstorm Force Company Subsidiaries

SubsidiaryImage

We are a product-led company known for popular solutions such as Astra Theme, Spectra, ZipWP, Starter Templates, Ultimate Addons, CartFlows, SureCart, SureTriggers, SureMembers, SureFeedback, LatePoint, Convert Pro, Schema Pro, and more. At Brainstorm Force, our mission is simple: to unlock the power of the Internet for small businesses. Over 5 million businesses worldwide trust our innovative software to elevate their online presence. As pioneers in our field, we are honored to be recognized as thought leaders, guiding the industry forward through our pursuit of innovation. With a diverse team of over 150+ talented individuals spanning 21+ countries, we bring together unique perspectives and expertise to deliver unparalleled solutions. We're hiring! Join our remote team on our mission to unlock the power of the Internet for small businesses. Together, let's shape the future of the Internet and empower small businesses to thrive like never before.

Loading...
similarCompanies

Brainstorm Force Similar Companies

Canva

We're a global online visual communications platform on a mission to empower the world to design. Featuring a simple drag-and-drop user interface and a vast range of templates ranging from presentations, documents, websites, social media graphics, posters, apparel to videos, plus a huge library of f

Instagram

More than one billion people around the world use Instagram, and we’re proud to be bringing them closer to the people and things they love. Instagram inspires people to see the world differently, discover new interests, and express themselves. Since launching in 2010, our community has grown at a r

Databricks

Databricks is the Data and AI company. More than 10,000 organizations worldwide — including Block, Comcast, Condé Nast, Rivian, Shell and over 60% of the Fortune 500 — rely on the Databricks Data Intelligence Platform to take control of their data and put it to work with AI. Databricks is headquarte

LinkedIn

Founded in 2003, LinkedIn connects the world's professionals to make them more productive and successful. With more than 1 billion members worldwide, including executives from every Fortune 500 company, LinkedIn is the world's largest professional network. The company has a diversified business mode

PayPal

We're championing possibilities for all by making money fast, easy, and more enjoyable. Our hope is unlock opportunities for people in their everyday lives and empower the millions of people and businesses around the world who trust, rely, and use PayPal every day. For support, visit the PayPal He

JD.COM

JD.com, also known as JINGDONG, is a leading e-commerce company transferring to be a technology and service enterprise with supply chain at its core. JD.com’s business has expanded across retail, technology, logistics, health, property development, industrials, and international business. Ranking 44

Microsoft

Every company has a mission. What's ours? To empower every person and every organization to achieve more. We believe technology can and should be a force for good and that meaningful innovation contributes to a brighter world in the future and today. Our culture doesn’t just encourage curiosity; it

bigbasket

Starting our journey in 2011, today, bigbasket - a Tata Enterprise is India’s largest online supermarket with over 13 million customers and a presence in 60+ cities & towns. With our presence spanning the entire spectrum of consumer needs, we operate through a range of business lines - bigbasket, bb

Workday

Workday is a leading provider of enterprise cloud applications for finance and human resources, helping customers adapt and thrive in a changing world. Workday applications for financial management, human resources, planning, spend management, and analytics are built with artificial intelligence and

newsone

Brainstorm Force CyberSecurity News

April 13, 2025 07:00 AM
100,000 WordPress Sites Vulnerable to Rogue Creation Vulnerability

A critical vulnerability affecting over 100000 WordPress websites has been discovered in the SureTriggers WordPress plugin.

December 10, 2024 08:00 AM
EU cybersecurity rules for smart devices enter into force

Rules for boosting the security of connected devices have entered into force in the European Union. The Cyber Resilience Act (CRA) puts...

June 26, 2024 07:00 AM
USF’s AI, cybersecurity and computing college to be an example across the nation, leaders say

The college, expected to launch in fall 2025 after approval by the Board of Trustees, will be the first of its kind in Florida.

August 02, 2023 07:00 AM
Digital Vanguards: 645th Cyberspace Squadron prevents cyber attacks leading to 100% mission success

The 645th Cyberspace Squadron (CYS) is a Delta Six unit supporting Space Systems Command (SSC). They support Space Launch Delta 45 by...

March 22, 2018 07:00 AM
AFCYBER hosts new Cybersecurity Foundry Course > Air Force > Article Display

Air Forces Cyber hosted its first-ever Cybersecurity Foundry Course, March 5-14, 2018, at MacDill Air Force Base, Florida.,

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Brainstorm Force CyberSecurity History Information

Official Website of Brainstorm Force

The official website of Brainstorm Force is https://www.BrainstormForce.com/.

Brainstorm Force’s AI-Generated Cybersecurity Score

According to Rankiteo, Brainstorm Force’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.

How many security badges does Brainstorm Force’ have ?

According to Rankiteo, Brainstorm Force currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Brainstorm Force have SOC 2 Type 1 certification ?

According to Rankiteo, Brainstorm Force is not certified under SOC 2 Type 1.

Does Brainstorm Force have SOC 2 Type 2 certification ?

According to Rankiteo, Brainstorm Force does not hold a SOC 2 Type 2 certification.

Does Brainstorm Force comply with GDPR ?

According to Rankiteo, Brainstorm Force is not listed as GDPR compliant.

Does Brainstorm Force have PCI DSS certification ?

According to Rankiteo, Brainstorm Force does not currently maintain PCI DSS compliance.

Does Brainstorm Force comply with HIPAA ?

According to Rankiteo, Brainstorm Force is not compliant with HIPAA regulations.

Does Brainstorm Force have ISO 27001 certification ?

According to Rankiteo,Brainstorm Force is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Brainstorm Force

Brainstorm Force operates primarily in the Software Development industry.

Number of Employees at Brainstorm Force

Brainstorm Force employs approximately 131 people worldwide.

Subsidiaries Owned by Brainstorm Force

Brainstorm Force presently has no subsidiaries across any sectors.

Brainstorm Force’s LinkedIn Followers

Brainstorm Force’s official LinkedIn profile has approximately 14,035 followers.

NAICS Classification of Brainstorm Force

Brainstorm Force is classified under the NAICS code 5112, which corresponds to Software Publishers.

Brainstorm Force’s Presence on Crunchbase

No, Brainstorm Force does not have a profile on Crunchbase.

Brainstorm Force’s Presence on LinkedIn

Yes, Brainstorm Force maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/brainstorm-force.

Cybersecurity Incidents Involving Brainstorm Force

As of December 04, 2025, Rankiteo reports that Brainstorm Force has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Brainstorm Force has an estimated 27,195 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Brainstorm Force ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does Brainstorm Force detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with wordfence, and remediation measures with patch released (version 1.0.79)..

Incident Details

Can you provide details on each incident ?

Incident : Vulnerability Exploitation

Title: CVE-2025-3102 Vulnerability in SureTriggers WordPress Plugin

Description: A critical security vulnerability, identified as CVE-2025-3102, was discovered in the SureTriggers WordPress plugin developed by Brainstorm Force, affecting over 100,000 websites. The flaw enables attackers to bypass authentication and create unauthorized administrator accounts via the plugin's improperly validated REST API endpoint. Exploitation of this vulnerability leads to full site compromise, with potential for backdoors, malware upload, phishing redirects, and spam content injection. After being reported through Wordfence's Bug Bounty Program, a patched version 1.0.79 was released to address this significant oversight in security.

Type: Vulnerability Exploitation

Attack Vector: REST API endpoint

Vulnerability Exploited: CVE-2025-3102

Motivation: Unauthorized Access, Site Compromise

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through REST API endpoint.

Impact of the Incidents

What was the impact of each incident ?

Incident : Vulnerability Exploitation BRA140041325

Systems Affected: WordPress Websites

Which entities were affected by each incident ?

Incident : Vulnerability Exploitation BRA140041325

Entity Name: Brainstorm Force

Entity Type: Plugin Developer

Industry: Software Development

Customers Affected: 100,000

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Vulnerability Exploitation BRA140041325

Third Party Assistance: Wordfence

Remediation Measures: Patch released (version 1.0.79)

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Wordfence.

Data Breach Information

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patch released (version 1.0.79), .

References

Where can I find more information about each incident ?

Incident : Vulnerability Exploitation BRA140041325

Source: Wordfence

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Wordfence.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Vulnerability Exploitation BRA140041325

Entry Point: REST API endpoint

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Vulnerability Exploitation BRA140041325

Root Causes: Improperly validated REST API endpoint

Corrective Actions: Patch released (version 1.0.79)

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Wordfence.

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patch released (version 1.0.79).

Additional Questions

Impact of the Incidents

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was WordPress Websites.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Wordfence.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Wordfence.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an REST API endpoint.

cve

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=brainstorm-force' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge