CVE-2026-1244: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codeccoop Forms Bridge – Infinite integrations
CVE-2026-1244 is a stored Cross-Site Scripting (XSS) vulnerability in the Forms Bridge – Infinite integrations WordPress plugin, affecting all versions up to 4. 2. 5. The flaw arises from improper sanitization and escaping of the 'id' shortcode attribute in the 'financoop_campaign' shortcode, allowing authenticated users with Contributor-level or higher privileges to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with contributors who can add or edit content. Mitigation involves restricting contributor privileges, monitoring shortcode usage, and applying patches or updates once available.
AI Analysis
Technical Summary
CVE-2026-1244 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Forms Bridge – Infinite integrations plugin for WordPress, specifically in the handling of the 'id' attribute within the 'financoop_campaign' shortcode. The vulnerability stems from insufficient input sanitization and output escaping in the forms_bridge_financoop_shortcode_error function, which processes user-supplied data. Authenticated users with Contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into the 'id' parameter. Because the injection is stored, the malicious script executes every time a user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing actions on behalf of the victim. The vulnerability does not require user interaction but does require authentication with at least Contributor privileges, limiting exploitation to insiders or compromised accounts. The CVSS 3.1 score of 6.4 reflects a medium severity, with network attack vector, low attack complexity, and partial impact on confidentiality and integrity but no impact on availability. No patches or official fixes are currently published, and no known exploits have been observed in the wild. The vulnerability affects all versions of the plugin up to 4.2.5, indicating a broad impact surface for sites using this plugin. The CWE-79 classification confirms this is a classic XSS issue due to improper neutralization of input during web page generation.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to WordPress-based websites using the Forms Bridge – Infinite integrations plugin. Successful exploitation can lead to session hijacking, unauthorized actions performed in the context of authenticated users, defacement, or phishing attacks via injected scripts. This can damage organizational reputation, lead to data leakage, and potentially facilitate further attacks such as privilege escalation or malware deployment. Since exploitation requires Contributor-level access, the threat is significant in environments with multiple content editors or where account compromise is possible. The vulnerability could impact customer-facing websites, intranets, or portals, affecting confidentiality and integrity of user data. Given the widespread use of WordPress in Europe and the popularity of plugins for form integration, organizations in sectors such as e-commerce, media, education, and government are particularly at risk. The lack of known exploits in the wild reduces immediate urgency but does not eliminate the risk of targeted attacks or insider threats.
Mitigation Recommendations
1. Immediately audit user roles and permissions to ensure that only trusted users have Contributor-level or higher access, minimizing the risk of malicious shortcode injection. 2. Monitor and review all content submissions that utilize the 'financoop_campaign' shortcode, especially the 'id' attribute, for suspicious or unexpected input. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious script patterns in shortcode parameters. 4. Encourage or enforce the use of Content Security Policy (CSP) headers to limit the impact of injected scripts by restricting script sources. 5. Regularly update WordPress core and plugins; apply any patches released by the vendor for this vulnerability as soon as they become available. 6. Consider temporarily disabling or replacing the Forms Bridge – Infinite integrations plugin if patching is delayed and the risk is unacceptable. 7. Educate content contributors about secure content practices and the risks of injecting untrusted input. 8. Conduct regular security scans focusing on stored XSS vulnerabilities and shortcode misuse.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1244: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codeccoop Forms Bridge – Infinite integrations
Description
CVE-2026-1244 is a stored Cross-Site Scripting (XSS) vulnerability in the Forms Bridge – Infinite integrations WordPress plugin, affecting all versions up to 4. 2. 5. The flaw arises from improper sanitization and escaping of the 'id' shortcode attribute in the 'financoop_campaign' shortcode, allowing authenticated users with Contributor-level or higher privileges to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with contributors who can add or edit content. Mitigation involves restricting contributor privileges, monitoring shortcode usage, and applying patches or updates once available.
AI-Powered Analysis
Technical Analysis
CVE-2026-1244 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Forms Bridge – Infinite integrations plugin for WordPress, specifically in the handling of the 'id' attribute within the 'financoop_campaign' shortcode. The vulnerability stems from insufficient input sanitization and output escaping in the forms_bridge_financoop_shortcode_error function, which processes user-supplied data. Authenticated users with Contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into the 'id' parameter. Because the injection is stored, the malicious script executes every time a user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing actions on behalf of the victim. The vulnerability does not require user interaction but does require authentication with at least Contributor privileges, limiting exploitation to insiders or compromised accounts. The CVSS 3.1 score of 6.4 reflects a medium severity, with network attack vector, low attack complexity, and partial impact on confidentiality and integrity but no impact on availability. No patches or official fixes are currently published, and no known exploits have been observed in the wild. The vulnerability affects all versions of the plugin up to 4.2.5, indicating a broad impact surface for sites using this plugin. The CWE-79 classification confirms this is a classic XSS issue due to improper neutralization of input during web page generation.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to WordPress-based websites using the Forms Bridge – Infinite integrations plugin. Successful exploitation can lead to session hijacking, unauthorized actions performed in the context of authenticated users, defacement, or phishing attacks via injected scripts. This can damage organizational reputation, lead to data leakage, and potentially facilitate further attacks such as privilege escalation or malware deployment. Since exploitation requires Contributor-level access, the threat is significant in environments with multiple content editors or where account compromise is possible. The vulnerability could impact customer-facing websites, intranets, or portals, affecting confidentiality and integrity of user data. Given the widespread use of WordPress in Europe and the popularity of plugins for form integration, organizations in sectors such as e-commerce, media, education, and government are particularly at risk. The lack of known exploits in the wild reduces immediate urgency but does not eliminate the risk of targeted attacks or insider threats.
Mitigation Recommendations
1. Immediately audit user roles and permissions to ensure that only trusted users have Contributor-level or higher access, minimizing the risk of malicious shortcode injection. 2. Monitor and review all content submissions that utilize the 'financoop_campaign' shortcode, especially the 'id' attribute, for suspicious or unexpected input. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious script patterns in shortcode parameters. 4. Encourage or enforce the use of Content Security Policy (CSP) headers to limit the impact of injected scripts by restricting script sources. 5. Regularly update WordPress core and plugins; apply any patches released by the vendor for this vulnerability as soon as they become available. 6. Consider temporarily disabling or replacing the Forms Bridge – Infinite integrations plugin if patching is delayed and the risk is unacceptable. 7. Educate content contributors about secure content practices and the risks of injecting untrusted input. 8. Conduct regular security scans focusing on stored XSS vulnerabilities and shortcode misuse.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-20T18:47:11.943Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6979b5554623b1157c9a94d7
Added to database: 1/28/2026, 7:05:57 AM
Last enriched: 2/4/2026, 9:24:33 AM
Last updated: 2/7/2026, 7:01:37 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.