Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3831: CWE-862 Missing Authorization in crmperks Database for Contact Form 7, WPforms, Elementor forms

0
Medium
VulnerabilityCVE-2026-3831cvecve-2026-3831cwe-862
Published: Wed Apr 01 2026 (04/01/2026, 01:24:20 UTC)
Source: CVE Database V5
Vendor/Project: crmperks
Product: Database for Contact Form 7, WPforms, Elementor forms

Description

CVE-2026-3831 is a medium-severity vulnerability in the crmperks Database plugin for Contact Form 7, WPforms, and Elementor forms on WordPress. The flaw arises from a missing authorization check in the entries_shortcode() function, allowing authenticated users with Contributor-level access or higher to access all form submissions. This includes sensitive user data such as names, emails, and phone numbers. Exploitation requires no user interaction but does require authenticated access with limited privileges. The vulnerability affects all plugin versions up to and including 1. 4. 9. There are no known exploits in the wild, and no patches have been released yet. Organizations using these plugins should prioritize restricting Contributor-level access and monitor for suspicious activity. The vulnerability has a CVSS score of 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 02:09:42 UTC

Technical Analysis

CVE-2026-3831 is a vulnerability identified in the crmperks Database plugin used with popular WordPress form plugins: Contact Form 7, WPforms, and Elementor forms. The root cause is a missing authorization check (CWE-862) in the entries_shortcode() function, which is responsible for displaying form submission entries. This flaw allows any authenticated user with Contributor-level permissions or higher to bypass intended access controls and retrieve all stored form submissions. These submissions typically contain personally identifiable information (PII) such as names, email addresses, and phone numbers collected via web forms. The vulnerability affects all versions up to 1.4.9 inclusive. Exploitation requires no additional user interaction but does require the attacker to have an account with Contributor or higher privileges on the WordPress site. The CVSS v3.1 base score is 4.3, indicating a medium severity primarily due to the confidentiality impact and the low attack complexity. No integrity or availability impacts are noted. No public exploits or patches are currently available, but the vulnerability is publicly disclosed and assigned CVE-2026-3831. The lack of authorization checks in a function that outputs sensitive data represents a significant security oversight, especially given the widespread use of these form plugins across WordPress sites globally.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive user data collected through web forms, including names, emails, and phone numbers. This can lead to privacy violations, identity theft, phishing attacks, and reputational damage for affected organizations. Since Contributor-level access is sufficient for exploitation, attackers do not need administrative privileges, increasing the risk if user accounts are compromised or improperly assigned. The vulnerability does not affect data integrity or availability, so it does not enable data modification or service disruption. However, the exposure of PII can have regulatory compliance implications under laws such as GDPR, CCPA, and others. Organizations relying on these plugins for customer interaction, lead generation, or support may face significant trust and legal consequences if exploited. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly documented and could be targeted in the future.

Mitigation Recommendations

1. Immediately audit and restrict user roles to ensure that only trusted users have Contributor-level or higher access. 2. Temporarily disable or restrict access to the crmperks Database plugin's entries display functionality until a patch is available. 3. Monitor WordPress user accounts for suspicious activity, especially those with Contributor or higher roles. 4. Implement strict access control policies and consider using a Web Application Firewall (WAF) to detect and block unauthorized attempts to access form submissions. 5. Regularly update all WordPress plugins and core software to the latest versions once the vendor releases a patch addressing this vulnerability. 6. Educate site administrators about the risks of over-privileging users and enforce the principle of least privilege. 7. Consider alternative plugins or custom solutions with robust authorization checks if immediate patching is not feasible. 8. Review and enhance logging and alerting mechanisms to detect potential exploitation attempts early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-03-09T13:37:57.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cc7a8ee6bfc5ba1d854126

Added to database: 4/1/2026, 1:53:18 AM

Last enriched: 4/1/2026, 2:09:42 AM

Last updated: 4/1/2026, 5:04:22 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses