Lead Form Builder & Contact Form Vulnerability (High) – CVE-2026-1454

Lead Form Builder & Contact Form Vulnerability (High) – CVE-2026-1454

by | Mar 10, 2026 | Plugins

Attack Vectors

High severity Stored Cross-Site Scripting (XSS) has been identified in the Lead Form Builder & Contact Form WordPress plugin (Responsive Contact Form Builder & Lead Generation Plugin) up to version 2.0.1 (CVE-2026-1454, CVSS 7.2).

The primary entry point is public form field submissions. Because the vulnerability is unauthenticated, an attacker does not need a login to submit a crafted payload through a site’s lead/contact form. Once stored, the malicious script can run later when the stored entry is viewed in a WordPress admin context or other page where the entry is rendered.

Security Weakness

The issue is caused by insufficient input sanitization in the plugin’s lfb_lead_sanitize() function, which omits certain field types from its sanitization whitelist. This allows attacker-supplied content to be stored without being properly cleaned.

Compounding the risk, output filtering uses an overly permissive configuration of wp_kses() that allows onclick attributes on anchor tags. This combination makes it easier for injected scripts to execute when the stored content is displayed.

Affected product: Lead Form Builder & Contact Form (slug: lead-form-builder) versions <= 2.0.1. Recommended remediation is to update to 2.0.2 or newer (patched version). Source: Wordfence advisory. CVE record: CVE-2026-1454.

Technical or Business Impacts

Administrative session risk: Stored XSS often aims to run code in a privileged user’s browser. If an administrator or marketing user views the affected lead entry, the injected script may be able to perform actions in their session context (for example, changing site settings or creating new admin users), depending on what the attacker attempts and what the browser/session allows.

Lead pipeline disruption and brand risk: Marketing teams rely on contact forms for revenue attribution, campaign measurement, and inbound sales. A compromise that alters form content, injects unwanted links, or causes visitors/admin users to see suspicious behavior can reduce conversion rates, harm brand trust, and lead to blacklisting or reputation damage if the site is leveraged for malicious redirects.

Compliance exposure: Contact forms frequently collect personal data (names, emails, phone numbers). If an attacker uses XSS to access or exfiltrate data shown in admin views, organizations may face incident-response obligations, potential regulatory notifications, and legal risk depending on jurisdiction and data classification.

Operational cost: Even without confirmed data loss, remediating a High severity web vulnerability can involve emergency patching, forensic review, credential resets, and communication overhead across Marketing, IT, Compliance, and leadership.

Similar Attacks

Stored XSS in widely used WordPress plugins is a recurring pattern, often triggered through public-facing forms or content fields and then executed when an administrator views the stored data. Examples:

CVE-2024-27956 (WP Automatic plugin) — a high-profile WordPress plugin security issue that drew broad attention and demonstrated how plugin flaws can lead to serious site compromise.
CVE-2021-24307 (Contact Form 7 Database Addon – CFDB7) — a WordPress plugin issue illustrating how stored data and admin views can become a pathway to exploitation when input/output handling is weak.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers