Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2707: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldgrid weForms – Easy Drag & Drop Contact Form Builder For WordPress

0
Medium
VulnerabilityCVE-2026-2707cvecve-2026-2707cwe-79
Published: Wed Mar 11 2026 (03/11/2026, 05:27:17 UTC)
Source: CVE Database V5
Vendor/Project: boldgrid
Product: weForms – Easy Drag & Drop Contact Form Builder For WordPress

Description

CVE-2026-2707 is a stored cross-site scripting (XSS) vulnerability in the weForms WordPress plugin affecting all versions up to 1. 6. 27. The flaw arises from inconsistent input sanitization between frontend AJAX submissions and REST API entry submissions, allowing authenticated users with Subscriber-level access or higher to inject malicious scripts into hidden form fields. These scripts execute when an administrator views the form entries page, which renders data using Vue. js's v-html directive without escaping. Exploitation requires no user interaction beyond submitting a crafted form entry via the REST API. The vulnerability impacts confidentiality and integrity but not availability, with a CVSS score of 6. 4 (medium severity). No known public exploits exist yet.

AI-Powered Analysis

AILast updated: 03/11/2026, 05:45:17 UTC

Technical Analysis

CVE-2026-2707 is a stored cross-site scripting (XSS) vulnerability identified in the weForms plugin for WordPress, a popular drag-and-drop contact form builder. The vulnerability affects all versions up to and including 1.6.27. The root cause is inconsistent input sanitization between two submission methods: frontend AJAX handlers and REST API entry submissions. Specifically, when form entries are submitted via the REST API endpoint (/wp-json/weforms/v1/forms/{id}/entries/), the plugin's prepare_entry() method receives the WP_REST_Request object as $args, bypassing the weforms_clean() sanitization function that normally cleans $_POST data during frontend submissions. Instead, the base field handler applies only a trim() operation to the input value, leaving it vulnerable to injection of malicious scripts. Authenticated attackers with Subscriber-level privileges or higher can exploit this by injecting arbitrary JavaScript into hidden form fields via the REST API. These scripts execute in the context of the administrator's browser when viewing the form entries page, which uses Vue.js's v-html directive to render entry data without escaping HTML content. This leads to stored XSS that compromises confidentiality and integrity by potentially stealing admin session cookies or performing unauthorized actions. The vulnerability has a CVSS 3.1 score of 6.4, reflecting medium severity with network attack vector, low attack complexity, and privileges required but no user interaction. No public exploits are currently known. The vulnerability was reserved on 2026-02-18 and published on 2026-03-11. The plugin vendor has not yet released a patch, so mitigation relies on restricting REST API access and additional input validation.

Potential Impact

The primary impact of CVE-2026-2707 is the compromise of administrative confidentiality and integrity within WordPress sites using the vulnerable weForms plugin. An attacker with low-level authenticated access (Subscriber or above) can inject malicious JavaScript into form entries that execute when administrators view submissions. This can lead to session hijacking, privilege escalation, or unauthorized administrative actions. Since the vulnerability is stored XSS, the malicious payload persists and can affect multiple administrators over time. Although availability is not directly impacted, the breach of administrative control can lead to further attacks disrupting site operations. Organizations relying on weForms for contact forms or data collection face risks of data leakage, defacement, or malware distribution. The medium CVSS score reflects the need for timely remediation, especially in environments with multiple administrators or high-value data. The lack of public exploits reduces immediate risk but does not eliminate it, as attackers may develop exploits. The vulnerability's exploitation requires authenticated access, limiting exposure to external unauthenticated attackers but still posing significant risk from compromised or malicious low-privilege users.

Mitigation Recommendations

1. Apply official patches from the weForms plugin vendor as soon as they become available to address the input sanitization flaw. 2. Until patches are released, restrict REST API access to trusted users only by implementing authentication and authorization controls, such as limiting access to known IP addresses or roles. 3. Implement additional input validation and sanitization on server-side REST API endpoints, ensuring all input fields are properly escaped or stripped of HTML/JavaScript content before storage. 4. Disable or restrict use of the REST API endpoints related to form entries if not required. 5. Educate administrators to avoid clicking suspicious links or viewing untrusted form entries until the vulnerability is remediated. 6. Monitor logs for unusual REST API activity or form submissions from low-privilege users. 7. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting the REST API endpoints. 8. Review and harden WordPress user roles and permissions to minimize the number of users with Subscriber or higher privileges. 9. Regularly audit installed plugins and remove unused or outdated ones to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-18T19:24:22.125Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0fdcf2f860ef9432e28e6

Added to database: 3/11/2026, 5:29:51 AM

Last enriched: 3/11/2026, 5:45:17 AM

Last updated: 3/11/2026, 10:14:36 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses