Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calc…

Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calc…

by | Mar 12, 2026 | Plugins

Attack Vectors

Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder (slug: formidable) has a High-severity vulnerability (CVSS 7.5) tracked as CVE-2026-2890. The issue can be exploited without authentication, meaning an external attacker does not need a user account to attempt abuse over the internet.

The risk is most relevant to organizations using Formidable Forms for any workflow that relies on successful payment confirmation (for example: paid registrations, deposits, donations, gated downloads, event tickets, or service bookings). An attacker may be able to make a payment appear “complete” in the site’s records by reusing a Stripe PaymentIntent in a way that bypasses expected payment integrity checks.

Security Weakness

The vulnerability affects Formidable Forms versions up to and including 6.28. According to the published details, the Stripe Link return handler (handle_one_time_stripe_link_return_url) can mark payment records as complete based only on the Stripe PaymentIntent status, without comparing the amount actually charged to the amount the site expects.

In addition, the verify_intent() logic is described as validating only client secret ownership without binding the PaymentIntent to a specific form or action. Together, these weaknesses can enable an unauthenticated payment integrity bypass via PaymentIntent reuse, allowing “paid” status to be recorded without the intended payment conditions being met.

Remediation: Update Formidable Forms to 6.29 or newer (patched). Source: Wordfence vulnerability advisory.

Technical or Business Impacts

Revenue loss and fraud: If payment completion can be recorded without enforcing the expected amount, attackers may obtain paid goods or services for less than intended, or potentially without a valid payment outcome matching your pricing rules.

Operational disruption: Teams may waste time fulfilling orders, provisioning access, or confirming registrations that appear legitimately paid in WordPress records but do not align with actual revenue collected.

Reporting and reconciliation issues: When website payment records are inconsistent with Stripe settlement data, finance teams face increased reconciliation effort, delayed close processes, and higher risk of unnoticed leakage.

Compliance and customer trust: Payment-related integrity issues can trigger internal audit findings, require incident response, and undermine confidence in online transaction workflows—especially for regulated or highly scrutinized organizations.

Similar Attacks

While this issue is specific to payment integrity validation in a WordPress plugin, payment-flow abuse and checkout manipulation are common themes in real-world incidents, including:

British Airways (Magecart) payment card theft (BBC) — attackers targeted online payment pages to steal card data during checkout.

Ticketmaster breach linked to third-party script (BBC) — a compromised supplier script impacted payment information security during online transactions.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers