Everest Forms Pro Vulnerability (High) – CVE-2026-27070

Everest Forms Pro Vulnerability (High) – CVE-2026-27070

by | Mar 19, 2026 | Plugins

Attack Vectors

Everest Forms Pro (WordPress plugin, slug: everest-forms-pro) is affected by a High severity vulnerability (CVE-2026-27070, CVSS 7.2; vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).

Because this is an unauthenticated stored cross-site scripting (XSS) issue, an attacker may not need an account to submit malicious content. If that content is stored and later displayed by the site, the injected script can execute when a visitor or staff member views the affected page or entry.

In practical business terms, the risk is highest on sites where forms are public-facing (lead gen, contact, event registration) and form submissions are later reviewed in the WordPress admin area or displayed on the front end (e.g., confirmations, listings, or embedded submission content).

Security Weakness

The reported root cause is insufficient input sanitization and output escaping in Everest Forms Pro versions up to and including 1.9.10. This combination can allow attacker-supplied content to be saved (“stored”) and then rendered back to users in a way that the browser interprets as executable script.

Stored XSS is especially concerning for leadership and compliance teams because it can turn normal business workflows (reviewing leads, opening submission details, viewing dashboards) into a trigger for malicious activity—without any obvious warning to the user.

According to the published advisory, there is no known patch available at this time. This shifts risk management from “update and move on” to a decision about mitigation, replacement, or removal based on your organization’s risk tolerance.

Technical or Business Impacts

If exploited, this vulnerability could expose your organization to brand, revenue, and compliance impacts, including:

Account and session risk: injected scripts can run in a victim’s browser while they are logged in, potentially enabling actions in the WordPress admin context or interfering with authenticated sessions.

Lead integrity and analytics distortion: malicious scripts can tamper with page behavior, form flows, and tracking signals—reducing trust in conversion reporting and potentially corrupting marketing data.

Customer trust and reputational harm: visitors may experience redirects, pop-ups, fake support prompts, or other on-site fraud patterns that erode credibility and reduce conversion rates.

Compliance exposure: depending on what data is handled on the site and how scripts are used, an incident can trigger internal reporting obligations and third-party notifications. The CVSS vector indicates scope change (S:C), which often maps to broader cross-application impact within the browser context.

Operational disruption: investigation, site cleanup, and emergency mitigations can pull marketing and web teams away from campaigns and planned releases.

Recommended risk actions (given “no known patch”): consider uninstalling Everest Forms Pro (or disabling affected forms) and replacing it with an alternative, increase monitoring for unexpected form submissions/content, and review who can access submission views in WordPress. Where feasible, add layered protections such as a reputable web application firewall (WAF) and tighter controls around any pages that render submission content.

Reference: CVE-2026-27070 record and Wordfence advisory source.

Similar Attacks

Stored XSS has repeatedly been used to spread rapidly and impact trusted brands because it executes in the victim’s browser on otherwise legitimate pages. Well-documented examples include:

The “Samy” MySpace worm (stored XSS-driven propagation that spread through user profile views).

The 2010 Twitter “onMouseOver” worm (XSS-based behavior that executed when users interacted with affected content, demonstrating how quickly user-to-user exposure can scale).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers