Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2890: CWE-862 Missing Authorization in strategy11team Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder

0
High
VulnerabilityCVE-2026-2890cvecve-2026-2890cwe-862
Published: Fri Mar 13 2026 (03/13/2026, 07:23:39 UTC)
Source: CVE Database V5
Vendor/Project: strategy11team
Product: Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder

Description

The Formidable Forms plugin for WordPress is vulnerable to a payment integrity bypass in all versions up to, and including, 6.28. This is due to the Stripe Link return handler (`handle_one_time_stripe_link_return_url`) marking payment records as complete based solely on the Stripe PaymentIntent status without comparing the intent's charged amount against the expected payment amount, and the `verify_intent()` function validating only client secret ownership without binding intents to specific forms or actions. This makes it possible for unauthenticated attackers to reuse a PaymentIntent from a completed low-value payment to mark a high-value payment as complete, effectively bypassing payment for goods or services.

AI-Powered Analysis

AILast updated: 03/13/2026, 08:00:22 UTC

Technical Analysis

CVE-2026-2890 is a missing authorization vulnerability (CWE-862) in the Formidable Forms WordPress plugin, specifically affecting the payment processing workflow with Stripe. The plugin's function handle_one_time_stripe_link_return_url marks payment records as complete based solely on the PaymentIntent status returned by Stripe, without verifying that the charged amount matches the expected payment amount for the transaction. Furthermore, the verify_intent() function only validates ownership of the client secret but does not bind the PaymentIntent to a particular form submission or payment action. This architectural flaw allows an attacker to reuse a PaymentIntent from a previously completed low-value transaction to mark a new, higher-value transaction as paid without actually making the payment. The vulnerability affects all versions up to 6.28 inclusive. The CVSS v3.1 score is 7.5 (high), reflecting the ease of exploitation (no authentication or user interaction required), the impact on integrity (unauthorized payment completion), and network attack vector. Although no known exploits have been observed in the wild yet, the vulnerability poses a serious risk to merchants relying on this plugin for payment processing. The lack of proper authorization checks and binding of payment intents to specific transactions is the root cause, highlighting a critical design oversight in the plugin's payment verification logic.

Potential Impact

The primary impact of this vulnerability is financial fraud through payment bypass. Attackers can exploit the flaw to mark high-value payments as complete without actually paying, resulting in revenue loss for merchants using the Formidable Forms plugin with Stripe integration. This undermines the integrity of the payment process and can lead to significant monetary damage, chargebacks, and reputational harm. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely by anyone aware of the flaw, increasing the attack surface. Organizations relying on this plugin for e-commerce, donations, or any paid services are at risk. Additionally, the trustworthiness of transaction records is compromised, which may affect accounting and compliance. The vulnerability does not impact confidentiality or availability directly but severely impacts transaction integrity and business operations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the Formidable Forms plugin to a patched version once available from the vendor. In the absence of an official patch, temporary mitigations include disabling Stripe payment functionality within the plugin or switching to alternative payment processing plugins that properly validate PaymentIntent amounts and bind them to specific transactions. Developers should implement strict server-side validation that compares the charged amount in the PaymentIntent with the expected payment amount for the form submission before marking payments as complete. Additionally, the verify_intent() function should be enhanced to bind PaymentIntents to specific form IDs or transaction identifiers to prevent reuse. Monitoring payment records for anomalies such as repeated use of the same PaymentIntent ID for multiple transactions can help detect exploitation attempts. Organizations should also review logs for suspicious payment completions and consider implementing additional fraud detection controls at the payment gateway or application level.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-20T17:24:41.038Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b3c0802f860ef943a8ad97

Added to database: 3/13/2026, 7:45:04 AM

Last enriched: 3/13/2026, 8:00:22 AM

Last updated: 3/14/2026, 3:41:28 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses