Optin Forms – Simple List Building Plugin for WordPress Vulnerabili…

Optin Forms – Simple List Building Plugin for WordPress Vulnerabili…

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2023-49841 is a Medium-severity Stored Cross-Site Scripting (XSS) issue (CVSS 4.4) affecting Optin Forms – Simple List Building Plugin for WordPress (slug: optin-forms) in versions up to and including 1.3.6.

The attack requires an authenticated user with Administrator-level permissions or higher to place malicious script content into the plugin’s admin settings. The injected script can then execute when a user loads an affected page in the WordPress admin or front-end context where the stored content is rendered.

This vulnerability is limited to multi-site installations and to installations where unfiltered_html has been disabled, per the published advisory. Reference: CVE record and Wordfence advisory.

Security Weakness

The core weakness is insufficient input sanitization and output escaping in plugin settings handling. In practical terms, the plugin does not adequately clean or safely display certain administrator-supplied values, allowing stored script payloads to be saved and later executed in a victim’s browser.

While this issue requires high privileges (Administrator+), it still matters for business risk because admin accounts are frequently targeted (phishing, credential reuse, device compromise) and because agency/vendor access or shared admin accounts can increase exposure.

Technical or Business Impacts

A successful Stored XSS can enable actions such as stealing authenticated session data, manipulating content or settings through the victim’s browser session, and redirecting users to fraudulent pages. In marketing operations, this can translate into compromised landing pages, altered opt-in flows, brand-damaging pop-ups, or deceptive tracking/analytics changes.

For leadership and compliance stakeholders, the most likely outcomes include brand trust impact, campaign integrity issues, and potential privacy/compliance concerns if user data exposure occurs through unauthorized admin actions performed via the injected script.

Remediation: Update Optin Forms to version 1.3.7 or a newer patched release. After updating, review administrator accounts and audit recent admin setting changes related to the plugin to ensure no malicious scripts were previously stored.

Similar attacks (real-world examples): Stored XSS has repeatedly affected WordPress plugins and themes and is commonly used to hijack admin sessions or inject unwanted site changes. See examples such as CVE-2021-25036, CVE-2022-0316, and CVE-2023-27372.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers