weForms – Easy Drag & Drop Contact Form Builder For WordPress Vulne…

weForms – Easy Drag & Drop Contact Form Builder For WordPress Vulne…

by | Mar 10, 2026 | Plugins

Attack Vectors

CVE-2026-2707 is a medium-severity Stored Cross-Site Scripting (XSS) issue (CVSS 6.4) affecting weForms – Easy Drag & Drop Contact Form Builder For WordPress (slug: weforms) in versions up to and including 1.6.27.

The primary attack path is through the plugin’s REST API entry submission endpoint: /wp-json/weforms/v1/forms/{id}/entries/. An attacker who already has a low-privileged WordPress account (Subscriber or higher) can submit a crafted form entry where a hidden field value includes malicious script content. Because this is a stored issue, the payload can execute later when staff view or manage the affected entries in the WordPress environment.

Security Weakness

The root cause is inconsistent input sanitization between the frontend AJAX submission handler and the REST API endpoint. For frontend submissions, the plugin can apply a sanitization fallback (via weforms_clean()) that cleans $_POST data. For REST submissions, the prepare_entry() method receives a WP_REST_Request object as the arguments, which can bypass that fallback behavior.

In practice, this gap means data submitted through the REST route may not be cleaned the same way as data submitted through the normal web form flow, enabling stored script injection via a hidden field value when the entry is later rendered.

Technical or Business Impacts

Stored XSS in a form/entry workflow is a business risk because it can target the people who review submissions—often marketing, sales, support, finance, or admins. Depending on where the entry content is displayed, potential impacts include:

Account compromise and unauthorized actions: Script execution in an authenticated user’s browser can enable session theft or actions performed in that user’s context, potentially escalating from a low-privilege attacker to higher-impact outcomes.

Data exposure and compliance concerns: Form entries frequently include personal data (names, emails, phone numbers, inquiries). If attackers can run scripts in staff sessions, it increases the chance of sensitive data exposure and may trigger incident-response and reporting obligations.

Operational disruption and reputational harm: Even “medium” severity issues can lead to real downtime, investigation costs, customer distrust, and campaign interruptions—especially when marketing forms are a key conversion path.

Recommended remediation: Update weForms to version 1.6.28 or newer (patched). Reference: CVE-2026-2707 record and the vendor research source Wordfence advisory.

Similar Attacks

Stored XSS has repeatedly been used to spread quickly, hijack accounts, and damage brands when malicious scripts run inside trusted web sessions. A few well-known examples include:

MySpace “Samy” worm (2005) — a classic XSS-driven worm that propagated rapidly by executing scripts within user profiles.

Cross-site scripting (XSS) incidents overview — documented patterns show how XSS is commonly leveraged for session theft, user impersonation, and malicious content injection, which mirrors the business risks of stored XSS in admin-facing entry review screens.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers