WP Forms Signature Contract Add-On Vulnerability (Medium) – CVE-202…

WP Forms Signature Contract Add-On Vulnerability (Medium) – CVE-202…

by | Feb 10, 2026 | Plugins

Attack Vectors

CVE-2026-24985 affects the WP Forms Signature Contract Add-On plugin (slug: wp-forms-signature-contract-add-on) in versions 1.8.2 and earlier, and is rated Medium severity (CVSS 4.3). The issue can be exploited by an authenticated WordPress user with Subscriber-level access or higher, meaning the attacker does not need admin rights to take advantage of the weakness.

The practical attack path is straightforward in many organizations: any account created for basic access (newsletter tools, partner portals, event users, internal stakeholders, or temporary contractors) can potentially be used to trigger the unauthorized behavior. Because this is a network-reachable issue and does not require user interaction, it can be executed quietly once a low-privilege account is obtained.

Security Weakness

The WP Forms Signature Contract Add-On is vulnerable due to a missing authorization (capability) check in a plugin function. In affected versions (up to and including 1.8.2), this missing check allows authenticated users who should not have that level of control to dismiss plugin notices.

While dismissing notices may sound minor, it represents a breakdown in role-based controls. In business terms, it means a basic user can change parts of the administrative experience that should be reserved for trusted roles, increasing the chance that important security or maintenance information is missed.

Technical or Business Impacts

Security visibility risk: Admin notices often communicate updates, warnings, and operational issues. If an attacker can dismiss these notices, your team may lose timely awareness of plugin updates or security-relevant alerts, increasing exposure windows.

Operational and compliance risk: Reduced visibility into site health and patch status can undermine internal controls. For regulated organizations or those with formal security governance, “missed warnings” can contribute to audit findings or delays in meeting patch management timelines.

Brand and revenue risk (indirect): This vulnerability does not indicate data theft or service outage on its own (CVSS indicates no confidentiality or availability impact), but it can contribute to poor security hygiene by obscuring notifications that help teams act quickly. Over time, that can raise the likelihood of a more damaging incident affecting customer trust and campaign performance.

Remediation: Update WP Forms Signature Contract Add-On to version 1.8.3 or a newer patched version. Track the issue under CVE-2026-24985 and reference the vendor intelligence source at Wordfence Threat Intelligence.

Similar Attacks

Role and authorization weaknesses in WordPress ecosystems are commonly abused because they allow low-privilege accounts to perform actions intended only for admins. Here are a few real examples of broadly similar access-control problems and how they are tracked publicly:

CVE-2024-27956
CVE-2023-2732
CVE-2021-29447

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers