Home

Description

The Fluent Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the AI Form Builder module in all versions up to, and including, 6.1.14 due to a combination of missing authorization checks, a leaked nonce, and insufficient input sanitization. The vulnerability allows Subscriber-level users to trigger AI form generation via a protected endpoint. When prompted, AI services will typically return bare JavaScript code (without <script> tags), which bypasses the plugin's sanitization. This stored JavaScript executes whenever anyone views the generated form, making it possible for authenticated attackers with Subscriber-level access and above to inject arbitrary web scripts that will execute in the context of any user accessing the form.

PUBLISHED Reserved 2026-01-15 | Published 2026-02-10 | Updated 2026-02-10 | Assigner Wordfence




MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-01-15:Vendor Notified
2026-02-09:Disclosed

Credits

Osvaldo Noe Gonzalez Del Rio finder

References

www.wordfence.com/...-4b75-4dae-9a6e-0afb02ed5bad?source=cve

plugins.trac.wordpress.org/...m/tags/6.1.12/boot/globals.php

plugins.trac.wordpress.org/...p/Modules/Ai/AiFormBuilder.php

plugins.trac.wordpress.org/...p/Modules/Ai/AiFormBuilder.php

plugins.trac.wordpress.org/...s/6.1.12/app/Hooks/actions.php

plugins.trac.wordpress.org/...rm/trunk/app/Hooks/actions.php

cve.org (CVE-2026-0996)

nvd.nist.gov (CVE-2026-0996)

Download JSON