Smart Forms – when you need more than just a contact form Vulnerabi…

Smart Forms – when you need more than just a contact form Vulnerabi…

by | Feb 13, 2026 | Plugins

Attack Vectors

Smart Forms – when you need more than just a contact form (slug: smart-forms) has a Medium severity vulnerability (CVSS 4.3, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) that can be abused by an attacker who already has a valid WordPress login at the Subscriber role (or higher). This means the initial “entry point” is not a public, anonymous visitor—it is someone who can authenticate.

The exposure occurs through a WordPress AJAX action named rednao_smart_forms_get_campaigns. Because the plugin is missing an authorization (capability) check for that action in versions up to and including 2.6.99, an authenticated user can request and retrieve campaign information they should not have access to.

From a business perspective, the most realistic threat scenarios include: compromised low-privilege accounts, former contractors or interns with lingering access, or legitimate users whose role should not allow visibility into donation or campaign operations.

Security Weakness

This issue is a missing authorization control (also described as a missing capability check). In practice, the plugin exposes campaign retrieval functionality via an AJAX endpoint without properly confirming that the requesting logged-in user is allowed to view that data.

According to the published advisory, affected sites may expose donation campaign data including campaign IDs and names to authenticated users at the Subscriber+ level. The vulnerability is tracked as CVE-2026-2022 (CVE record), and the vendor-facing details are documented by Wordfence (source).

Technical or Business Impacts

Data exposure and competitive intelligence: Even if the exposed fields are “only” campaign IDs and names, campaign naming often reveals strategic initiatives, donor drives, partnerships, or timing. For marketing and leadership teams, that can translate into reputational risk, messaging leakage, and avoidable scrutiny.

Compliance and governance concerns: Many organizations treat campaign and donation operations data as sensitive internal information. If low-privilege accounts can access it without business justification, it may violate internal access-control policies and create audit findings for compliance teams.

Increased risk from account compromise: Because this vulnerability requires only a low-privilege authenticated account, any password reuse, phishing, or leaked credentials can become a quick path to unauthorized data visibility—without needing users to click anything (the advisory indicates no user interaction is required).

Operational risk due to lack of a known patch: The remediation guidance indicates no known patch available. That elevates the business decision: accept the residual risk with mitigations, or reduce exposure by removing/replacing the plugin.

Recommended mitigation options (risk-tolerance dependent): consider uninstalling the affected plugin and replacing it, tighten role assignments (minimize Subscriber accounts where possible), review user access and remove stale accounts, and monitor for unusual authenticated activity that could indicate data harvesting.

Similar Attacks

Authorization gaps that allow authenticated, low-privilege users to access data are a recurring pattern in WordPress. Here are real, public examples of similar issues affecting other plugins:

Elementor Pro (2021): Authenticated vulnerability used to enable privilege escalation and site takeover

Easy WP SMTP (2019): Unauthorized options access that could expose sensitive configuration data

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers