Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0996: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder

0
Medium
VulnerabilityCVE-2026-0996cvecve-2026-0996cwe-79
Published: Tue Feb 10 2026 (02/10/2026, 05:29:42 UTC)
Source: CVE Database V5
Vendor/Project: techjewel
Product: Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder

Description

CVE-2026-0996 is a stored Cross-Site Scripting (XSS) vulnerability in the Fluent Forms WordPress plugin, affecting all versions up to 6. 1. 14. It arises from missing authorization checks, leaked nonces, and insufficient input sanitization in the AI Form Builder module. Authenticated users with Subscriber-level access can inject malicious JavaScript code that executes in the context of any user viewing the affected form, without requiring user interaction. This vulnerability can lead to information disclosure and session hijacking. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low privileges required but no user interaction needed. European organizations using this plugin on WordPress sites are at risk, especially those with public-facing forms. Mitigation involves promptly updating the plugin once a patch is released, restricting Subscriber-level access, and implementing additional input validation and Content Security Policies.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:47:24 UTC

Technical Analysis

CVE-2026-0996 is a stored Cross-Site Scripting vulnerability identified in the Fluent Forms WordPress plugin, specifically within its AI Form Builder module. The vulnerability stems from a combination of missing authorization checks, a leaked nonce, and inadequate input sanitization. Subscriber-level users, who typically have limited permissions, can exploit this flaw by triggering AI form generation through a protected endpoint. The AI service returns JavaScript code snippets without <script> tags, which bypass the plugin's sanitization routines. This malicious JavaScript is stored and executed whenever any user views the generated form, enabling attackers to run arbitrary scripts in the context of the victim's browser. The attack does not require user interaction, increasing its risk. The vulnerability affects all versions up to and including 6.1.14 of the plugin. The CVSS 3.1 score of 6.4 reflects a medium severity, with network attack vector, low attack complexity, and privileges required at the Subscriber level. The scope is changed, as the vulnerability affects other users beyond the attacker, impacting confidentiality and integrity but not availability. No known exploits are currently in the wild, but the risk remains significant due to the widespread use of WordPress and the plugin's popularity.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized script execution on websites using the Fluent Forms plugin, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of users. Public-facing WordPress sites that rely on this plugin for contact forms, surveys, or quizzes are particularly vulnerable. The ability for low-privileged users to inject scripts increases insider threat risks and the possibility of automated attacks exploiting compromised subscriber accounts. Confidentiality of user data can be compromised, and the integrity of website content can be undermined, damaging organizational reputation and trust. While availability is not directly impacted, the indirect consequences of exploitation could lead to service disruptions or regulatory scrutiny under GDPR if personal data is exposed. Organizations with high web traffic and customer engagement through WordPress forms are at elevated risk.

Mitigation Recommendations

Immediate mitigation should include restricting Subscriber-level user permissions to the minimum necessary and monitoring for suspicious activity related to form creation or AI form generation endpoints. Organizations should implement Web Application Firewalls (WAFs) with rules targeting stored XSS patterns specific to Fluent Forms. Applying strict Content Security Policies (CSP) can help prevent execution of injected scripts. Until an official patch is released, disabling the AI Form Builder module or the Fluent Forms plugin entirely on critical sites is advisable. Once a patch becomes available, prompt updating to the fixed version is essential. Additionally, conducting regular security audits of WordPress plugins and monitoring for leaked nonces or unusual authorization bypasses can reduce risk. User training to recognize phishing or social engineering attempts that could leverage this vulnerability is also recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-15T15:42:36.325Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698ac9b04b57a58fa1e63df0

Added to database: 2/10/2026, 6:01:20 AM

Last enriched: 2/17/2026, 9:47:24 AM

Last updated: 2/21/2026, 12:20:19 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats