Description
The Fluent Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the AI Form Builder module in all versions up to, and including, 6.1.14 due to a combination of missing authorization checks, a leaked nonce, and insufficient input sanitization. The vulnerability allows Subscriber-level users to trigger AI form generation via a protected endpoint. When prompted, AI services will typically return bare JavaScript code (without <script> tags), which bypasses the plugin's sanitization. This stored JavaScript executes whenever anyone views the generated form, making it possible for authenticated attackers with Subscriber-level access and above to inject arbitrary web scripts that will execute in the context of any user accessing the form.
Problem types
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
* (semver)
Timeline
| 2026-01-15: | Vendor Notified |
| 2026-02-09: | Disclosed |
Credits
Osvaldo Noe Gonzalez Del Rio
References
www.wordfence.com/...-4b75-4dae-9a6e-0afb02ed5bad?source=cve
plugins.trac.wordpress.org/...m/tags/6.1.12/boot/globals.php
plugins.trac.wordpress.org/...p/Modules/Ai/AiFormBuilder.php
plugins.trac.wordpress.org/...p/Modules/Ai/AiFormBuilder.php
plugins.trac.wordpress.org/...s/6.1.12/app/Hooks/actions.php
plugins.trac.wordpress.org/...rm/trunk/app/Hooks/actions.php