Description
The Form Notify plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.1.10. This is due to the plugin trusting user-controlled cookie data to determine which WordPress account to authenticate after a LINE OAuth login. When LINE doesn't provide an email address (which is common), the plugin falls back to reading the 'form_notify_line_email' cookie value without verifying that the LINE account is associated with that email address. This makes it possible for unauthenticated attackers to gain access to any user account on the site, including administrator accounts, by completing a LINE OAuth flow with their own LINE account while injecting a malicious cookie containing the target victim's email address.
Problem types
CWE-287 Improper Authentication
Product status
Any version
Timeline
| 2026-05-14: | Vendor Notified |
| 2026-05-14: | Disclosed |
Credits
Nabil Irawan
References
www.wordfence.com/...-9b95-4052-bab3-85aca01f6ab7?source=cve
plugins.trac.wordpress.org/...k/src/APIs/Line/Login/User.php
plugins.trac.wordpress.org/...8/src/APIs/Line/Login/User.php
plugins.trac.wordpress.org/.../src/APIs/Line/Login/Route.php
plugins.trac.wordpress.org/.../src/APIs/Line/Login/Route.php
plugins.trac.wordpress.org/...k/src/APIs/Line/Login/User.php
plugins.trac.wordpress.org/...8/src/APIs/Line/Login/User.php
plugins.trac.wordpress.org/...m-notify&sfp_email=&sfph_mail=
github.com/oberonlai/form-notify/commit/5eab0ea
github.com/oberonlai/form-notify/commit/9780764