CVE-2026-2888: CWE-639 Authorization Bypass Through User-Controlled Key in strategy11team Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder
CVE-2026-2888 is a medium severity authorization bypass vulnerability in the Formidable Forms WordPress plugin up to version 6. 28. It arises from the `frm_strp_amount` AJAX handler overwriting global POST data with attacker-controlled JSON, allowing manipulation of payment amounts via dynamic pricing shortcodes. The handler uses a nonce exposed publicly in JavaScript, which protects against CSRF but not unauthorized access, enabling unauthenticated attackers to reduce payment amounts on forms. This flaw impacts the integrity of payment processing but does not affect confidentiality or availability. No known exploits are reported in the wild yet. Organizations using this plugin for payment forms are at risk of financial loss due to underpayment. Mitigation requires patching or disabling dynamic pricing features until a fix is available. Countries with widespread WordPress usage and e-commerce reliance are most at risk.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-2888 affects the Formidable Forms plugin for WordPress, specifically versions up to and including 6.28. The root cause is an authorization bypass through a user-controlled key in the AJAX handler `frm_strp_amount` (also known as `update_intent_ajax`). This handler processes payment amount recalculations by overwriting the global `$_POST` array with JSON input controlled by an attacker. The recalculation occurs in the function `generate_false_entry()`, which resolves dynamic pricing via field shortcodes. Although the handler employs a nonce for CSRF protection, this nonce is publicly exposed in the page's JavaScript (`frm_stripe_vars.nonce`), meaning it does not provide true authorization. As a result, unauthenticated attackers can manipulate the PaymentIntent amounts before payment completion, effectively paying less than intended for goods or services. This vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key). The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with no impact on confidentiality or availability but a partial impact on integrity. No known exploits have been reported in the wild as of the publication date. The vulnerability affects all versions of the plugin up to 6.28, which is widely used for contact forms, surveys, quizzes, payments, calculators, and custom form building in WordPress environments.
Potential Impact
The primary impact of CVE-2026-2888 is financial loss due to unauthorized manipulation of payment amounts on websites using the vulnerable Formidable Forms plugin with dynamic pricing enabled. Attackers can bypass authorization controls and reduce payment amounts without authentication or user interaction, compromising the integrity of payment transactions. This can lead to revenue loss for e-commerce sites, subscription services, or any online business relying on this plugin for payment processing. While confidentiality and availability are not directly affected, the trustworthiness of payment data is undermined. Organizations may also face reputational damage if customers or partners become aware of the vulnerability exploitation. The scope includes all WordPress sites using the affected plugin versions with dynamic pricing features enabled, which could be substantial given WordPress's market share. The absence of known exploits currently limits immediate widespread impact, but the vulnerability is straightforward to exploit due to the exposed nonce and lack of authorization checks.
Mitigation Recommendations
1. Immediately update the Formidable Forms plugin to a patched version once released by the vendor that addresses the authorization bypass issue. 2. Until a patch is available, disable dynamic pricing features or any payment forms that rely on the vulnerable AJAX handler to prevent exploitation. 3. Implement additional server-side authorization checks to validate user permissions before processing payment amount recalculations. 4. Avoid exposing sensitive nonces or tokens in publicly accessible JavaScript to prevent misuse. 5. Monitor payment transactions for anomalies such as unexpected low payment amounts or repeated payment attempts. 6. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the vulnerable handler. 7. Conduct regular security audits of WordPress plugins, especially those handling payments, to identify and remediate similar authorization issues. 8. Educate developers and administrators on secure coding practices around AJAX handlers and nonce usage to prevent future vulnerabilities.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2026-2888: CWE-639 Authorization Bypass Through User-Controlled Key in strategy11team Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder
Description
CVE-2026-2888 is a medium severity authorization bypass vulnerability in the Formidable Forms WordPress plugin up to version 6. 28. It arises from the `frm_strp_amount` AJAX handler overwriting global POST data with attacker-controlled JSON, allowing manipulation of payment amounts via dynamic pricing shortcodes. The handler uses a nonce exposed publicly in JavaScript, which protects against CSRF but not unauthorized access, enabling unauthenticated attackers to reduce payment amounts on forms. This flaw impacts the integrity of payment processing but does not affect confidentiality or availability. No known exploits are reported in the wild yet. Organizations using this plugin for payment forms are at risk of financial loss due to underpayment. Mitigation requires patching or disabling dynamic pricing features until a fix is available. Countries with widespread WordPress usage and e-commerce reliance are most at risk.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-2888 affects the Formidable Forms plugin for WordPress, specifically versions up to and including 6.28. The root cause is an authorization bypass through a user-controlled key in the AJAX handler `frm_strp_amount` (also known as `update_intent_ajax`). This handler processes payment amount recalculations by overwriting the global `$_POST` array with JSON input controlled by an attacker. The recalculation occurs in the function `generate_false_entry()`, which resolves dynamic pricing via field shortcodes. Although the handler employs a nonce for CSRF protection, this nonce is publicly exposed in the page's JavaScript (`frm_stripe_vars.nonce`), meaning it does not provide true authorization. As a result, unauthenticated attackers can manipulate the PaymentIntent amounts before payment completion, effectively paying less than intended for goods or services. This vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key). The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with no impact on confidentiality or availability but a partial impact on integrity. No known exploits have been reported in the wild as of the publication date. The vulnerability affects all versions of the plugin up to 6.28, which is widely used for contact forms, surveys, quizzes, payments, calculators, and custom form building in WordPress environments.
Potential Impact
The primary impact of CVE-2026-2888 is financial loss due to unauthorized manipulation of payment amounts on websites using the vulnerable Formidable Forms plugin with dynamic pricing enabled. Attackers can bypass authorization controls and reduce payment amounts without authentication or user interaction, compromising the integrity of payment transactions. This can lead to revenue loss for e-commerce sites, subscription services, or any online business relying on this plugin for payment processing. While confidentiality and availability are not directly affected, the trustworthiness of payment data is undermined. Organizations may also face reputational damage if customers or partners become aware of the vulnerability exploitation. The scope includes all WordPress sites using the affected plugin versions with dynamic pricing features enabled, which could be substantial given WordPress's market share. The absence of known exploits currently limits immediate widespread impact, but the vulnerability is straightforward to exploit due to the exposed nonce and lack of authorization checks.
Mitigation Recommendations
1. Immediately update the Formidable Forms plugin to a patched version once released by the vendor that addresses the authorization bypass issue. 2. Until a patch is available, disable dynamic pricing features or any payment forms that rely on the vulnerable AJAX handler to prevent exploitation. 3. Implement additional server-side authorization checks to validate user permissions before processing payment amount recalculations. 4. Avoid exposing sensitive nonces or tokens in publicly accessible JavaScript to prevent misuse. 5. Monitor payment transactions for anomalies such as unexpected low payment amounts or repeated payment attempts. 6. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the vulnerable handler. 7. Conduct regular security audits of WordPress plugins, especially those handling payments, to identify and remediate similar authorization issues. 8. Educate developers and administrators on secure coding practices around AJAX handlers and nonce usage to prevent future vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-20T17:11:27.201Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b3ceae2f860ef943b31138
Added to database: 3/13/2026, 8:45:34 AM
Last enriched: 3/13/2026, 8:59:37 AM
Last updated: 3/13/2026, 9:55:10 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.