Gravity Forms Vulnerability (Medium) – CVE-2026-3492

Gravity Forms Vulnerability (Medium) – CVE-2026-3492

by | Mar 11, 2026 | Plugins

Attack Vectors

CVE-2026-3492 affects the Gravity Forms plugin (gravityforms) in versions up to and including 2.9.28.1 and is rated Medium severity (CVSS 6.4). The issue is an authenticated (Subscriber+) stored cross-site scripting (XSS) vulnerability triggered through manipulation of a form title.

In practical terms, any user account that can authenticate to your WordPress site (including low-privilege roles like Subscriber, depending on how accounts are issued) may be able to create a form from a template via an AJAX path and store a malicious payload in the form’s title. When staff later interact with Gravity Forms in the WordPress admin—specifically when the title is displayed in the Form Switcher dropdown—the stored script can execute without requiring the victim to click anything.

Security Weakness

The vulnerability is described as a compound failure: missing authorization checks on the create_from_template AJAX endpoint (allowing any authenticated user to create forms), insufficient input sanitization for the form title (notably, single quotes can persist), and missing output escaping when the title is rendered (the title attribute is constructed without esc_attr(), and the referenced JavaScript escaping utility does not escape quotes).

This combination matters to business owners because it can turn what looks like “just a form title field” into a reliable place to persist malicious content that executes later inside an administrative workflow—often where users have higher privileges and access to sensitive data.

Technical or Business Impacts

A stored XSS in an administrative interface can enable attackers to perform actions in the context of the victim’s session. Depending on who views the affected admin screen, this can translate into unauthorized administrative actions, tampering with site settings or forms, and potential access to information handled through forms (for example, lead data, customer inquiries, or other submissions your organization collects).

From a business-risk perspective, the most common outcomes are disruption to lead capture and campaign operations, reputational damage (especially if users are redirected or shown untrusted content), and increased compliance exposure if form submissions include regulated or sensitive information. Even at Medium severity, issues like this are often used as stepping stones to broader compromise once an attacker gains a foothold through any authenticated account.

Remediation: Update Gravity Forms to 2.9.29 or a newer patched version. Reference: CVE-2026-3492 and the vendor analysis source at Wordfence.

Similar Attacks

Stored XSS has been used in multiple real-world incidents to rapidly spread malicious actions through trusted user sessions. A classic example is the “Samy” MySpace worm, which leveraged stored XSS to propagate automatically across user profiles.

Another widely reported case involved an XSS worm impacting a popular social media management tool: TweetDeck’s XSS worm incident, where malicious code executed in users’ sessions and spread via automated actions.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers