Gutena Forms – Contact Form, Survey Form, Feedback Form, Booking Fo…

Gutena Forms – Contact Form, Survey Form, Feedback Form, Booking Fo…

by | Mar 19, 2026 | Plugins

Attack Vectors

This Medium-severity vulnerability (CVE-2026-1753, CVSS 4.3) affects the WordPress plugin Gutena Forms – Contact Form, Survey Form, Feedback Form, Booking Form, and Custom Form Builder (slug: gutena-forms) in versions prior to 1.6.1.

An attacker must be able to authenticate to your WordPress site with at least Contributor access (or higher). In business terms, this can occur through compromised staff credentials, shared accounts, weak passwords, phishing, or an over-permissioned vendor/agency login.

Once logged in, the attacker can attempt to update plugin settings without the authorization checks you would normally expect, enabling unwanted changes to how your forms operate.

Security Weakness

The issue is caused by a missing capability (authorization) check in a plugin function, allowing authenticated users (Contributor+) to perform an unauthorized action related to settings updates in affected versions.

Official references: CVE-2026-1753 and the vendor/community advisory from Wordfence: Wordfence vulnerability record.

Remediation: Update Gutena Forms to version 1.6.1 or newer (patched). Also review WordPress user roles to ensure Contributors do not have access beyond what they need.

Technical or Business Impacts

While the CVSS rating is Medium and does not indicate data exposure by itself, unauthorized settings changes can still create real business risk—especially for marketing and lead generation operations that rely on form integrity.

Potential impacts include disruption to lead capture workflows, unexpected changes to form behavior, operational downtime for campaigns, increased spam/noise in submissions, and brand or customer trust issues if forms behave unexpectedly. For compliance teams, unapproved configuration changes can complicate auditability and change-control expectations around how customer inquiries and feedback are collected and handled.

Similar Attacks: Authorization flaws in WordPress plugins are a common path to privilege misuse and site changes after a low-level account is compromised. For example, the WP GDPR Compliance plugin vulnerability reported by Wordfence (2018) demonstrates how plugin authorization weaknesses can translate into practical business risk when attackers gain access.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers