Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1674: CWE-862 Missing Authorization in saadiqbal Gutena Forms – Contact Form, Survey Form, Feedback Form, Booking Form, and Custom Form Builder

0
Medium
VulnerabilityCVE-2026-1674cvecve-2026-1674cwe-862
Published: Wed Mar 04 2026 (03/04/2026, 11:22:30 UTC)
Source: CVE Database V5
Vendor/Project: saadiqbal
Product: Gutena Forms – Contact Form, Survey Form, Feedback Form, Booking Form, and Custom Form Builder

Description

CVE-2026-1674 is a medium severity vulnerability in the Gutena Forms WordPress plugin, affecting all versions up to 1. 6. 0. It arises from missing authorization checks in the save_gutena_forms_schema() function, allowing authenticated users with Contributor-level access or higher to modify option values on the site. Exploitation can lead to unauthorized changes such as enabling user registration when disabled or causing site errors that result in denial of service. The vulnerability does not impact confidentiality but can compromise integrity and availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or implementing strict role management to mitigate risks. Countries with significant WordPress usage and high adoption of this plugin are most at risk, including the United States, United Kingdom, Germany, Australia, Canada, and India.

AI-Powered Analysis

AILast updated: 03/04/2026, 11:48:23 UTC

Technical Analysis

CVE-2026-1674 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Gutena Forms plugin for WordPress, which includes Contact Form, Survey Form, Feedback Form, Booking Form, and Custom Form Builder functionalities. The root cause is the absence of proper authorization checks in the save_gutena_forms_schema() function, which processes and saves form schema data. This flaw allows any authenticated user with at least Contributor-level privileges to update WordPress option values to structured array data. Such unauthorized modifications can be weaponized to alter site behavior, for example, enabling user registration when it is explicitly disabled or triggering errors that cause denial of service conditions. The vulnerability affects all plugin versions up to and including 1.6.0. The CVSS v3.1 score is 6.5 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the Contributor level, with no user interaction needed. The impact is primarily on integrity and availability, with no direct confidentiality loss. No public exploits have been reported yet, but the vulnerability poses a risk due to the widespread use of WordPress and the plugin. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for interim mitigations.

Potential Impact

The vulnerability allows authenticated users with Contributor-level access or higher to modify critical site options, potentially leading to unauthorized site configuration changes and denial of service. This can disrupt normal site operations, degrade user experience, and undermine trust in the affected websites. Enabling user registration when it is supposed to be disabled could lead to spam registrations or unauthorized account creation, increasing the attack surface for further exploitation. Denial of service caused by site errors can result in downtime, impacting business continuity and potentially causing financial and reputational damage. Since WordPress powers a significant portion of the web, and Gutena Forms is a popular plugin, the scope of affected systems is broad. Organizations relying on this plugin without proper access controls or patching are at risk. The vulnerability does not expose confidential data directly but compromises site integrity and availability, which can have cascading effects on overall security posture.

Mitigation Recommendations

1. Immediately restrict Contributor-level and higher user roles to trusted personnel only, minimizing the risk of exploitation. 2. Monitor and audit changes to WordPress option values, especially those related to user registration and site configuration, to detect unauthorized modifications. 3. Implement a Web Application Firewall (WAF) with custom rules to detect and block suspicious requests targeting the save_gutena_forms_schema() function or related endpoints. 4. Disable or limit the Gutena Forms plugin functionality temporarily if patching is not yet available, especially on high-risk or public-facing sites. 5. Regularly back up site configurations and databases to enable quick recovery in case of denial of service or configuration tampering. 6. Follow the plugin vendor’s updates closely and apply patches as soon as they are released. 7. Employ the principle of least privilege for WordPress user roles, ensuring users have only the permissions necessary for their tasks. 8. Conduct penetration testing focusing on role-based access control to identify similar authorization weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-30T01:38:03.875Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a81880d1a09e29cb2f5309

Added to database: 3/4/2026, 11:33:20 AM

Last enriched: 3/4/2026, 11:48:23 AM

Last updated: 3/4/2026, 12:49:29 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses