Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3487: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpmudev Forminator Forms – Contact Form, Payment Form & Custom Form Builder

0
Medium
VulnerabilityCVE-2025-3487cvecve-2025-3487cwe-79
Published: Thu Apr 17 2025 (04/17/2025, 11:13:05 UTC)
Source: CVE Database V5
Vendor/Project: wpmudev
Product: Forminator Forms – Contact Form, Payment Form & Custom Form Builder

Description

CVE-2025-3487 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin Forminator Forms – Contact Form, Payment Form & Custom Form Builder, affecting all versions up to 1. 42. 0. The vulnerability arises from improper input sanitization and output escaping of the 'limit' parameter, allowing authenticated users with Contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild as of now. Exploitation requires authentication but no user interaction, and the scope is limited to websites using this plugin. Organizations running WordPress sites with this plugin should prioritize patching or applying mitigations to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:35:33 UTC

Technical Analysis

CVE-2025-3487 is a stored cross-site scripting (XSS) vulnerability identified in the Forminator Forms plugin for WordPress, which is widely used for creating contact, payment, and custom forms. The vulnerability specifically involves the 'limit' parameter, which is not properly sanitized or escaped before being rendered in web pages. This flaw allows authenticated attackers with Contributor-level privileges or higher to inject arbitrary JavaScript code into pages generated by the plugin. Since the malicious script is stored persistently, it executes every time a user visits the affected page, potentially compromising user sessions, stealing cookies, or performing actions on behalf of the user. The vulnerability does not require user interaction beyond visiting the page, and the attacker must have at least Contributor access, which is a moderately low privilege level in WordPress. The CVSS 3.1 base score is 6.4, reflecting a medium severity due to network exploitability, low attack complexity, and partial impact on confidentiality and integrity, but no impact on availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS. Given the widespread use of WordPress and the popularity of the Forminator plugin, this vulnerability poses a significant risk to many websites, especially those that allow multiple contributors or editors. Attackers exploiting this vulnerability could leverage it to escalate privileges, conduct phishing, or spread malware through compromised sites.

Potential Impact

The impact of CVE-2025-3487 is primarily on the confidentiality and integrity of affected WordPress websites and their users. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the vulnerable site, which can lead to session hijacking, theft of sensitive user data such as cookies or credentials, defacement of web pages, and unauthorized actions performed on behalf of users. Since the vulnerability requires only Contributor-level access, attackers who gain such access through credential compromise or social engineering can leverage this flaw to escalate their control and potentially pivot to higher privileges. For organizations, this can result in reputational damage, loss of customer trust, and potential regulatory penalties if user data is exposed. The vulnerability does not impact availability directly, so denial-of-service is not a primary concern. However, the persistent nature of stored XSS means that the malicious payload can affect all visitors to the compromised pages, amplifying the risk. Given the extensive use of WordPress globally and the popularity of the Forminator plugin, numerous small to medium businesses, e-commerce sites, and content platforms are at risk. Attackers could also use this vulnerability as a foothold for further attacks within the network or to distribute malware to site visitors.

Mitigation Recommendations

To mitigate CVE-2025-3487, organizations should immediately update the Forminator Forms plugin to a patched version once available. Until an official patch is released, administrators should restrict Contributor-level access and review user roles to minimize the number of users who can inject content. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injections targeting the 'limit' parameter can provide temporary protection. Site owners should also enable Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly audit and sanitize all user-generated content, especially form inputs, and monitor logs for unusual activities related to form submissions. Employing security plugins that scan for XSS payloads and anomalous content can help detect exploitation attempts. Additionally, educating users with Contributor access about phishing and credential security reduces the risk of account compromise. Finally, maintain regular backups of website data to enable quick recovery if an attack occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-09T21:15:59.142Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b2bb7ef31ef0b54ef71

Added to database: 2/25/2026, 9:35:39 PM

Last enriched: 2/25/2026, 10:35:33 PM

Last updated: 2/26/2026, 8:33:10 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats