Home

Description

The Form Notify plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.1.10. This is due to the plugin trusting user-controlled cookie data to determine which WordPress account to authenticate after a LINE OAuth login. When LINE doesn't provide an email address (which is common), the plugin falls back to reading the 'form_notify_line_email' cookie value without verifying that the LINE account is associated with that email address. This makes it possible for unauthenticated attackers to gain access to any user account on the site, including administrator accounts, by completing a LINE OAuth flow with their own LINE account while injecting a malicious cookie containing the target victim's email address.

PUBLISHED Reserved 2026-03-31 | Published 2026-05-15 | Updated 2026-05-15 | Assigner Wordfence




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-287 Improper Authentication

Product status

Default status
unaffected

Any version
affected

Timeline

2026-05-14:Vendor Notified
2026-05-14:Disclosed

Credits

Nabil Irawan finder

References

www.wordfence.com/...-9b95-4052-bab3-85aca01f6ab7?source=cve

plugins.trac.wordpress.org/...k/src/APIs/Line/Login/User.php

plugins.trac.wordpress.org/...8/src/APIs/Line/Login/User.php

plugins.trac.wordpress.org/.../src/APIs/Line/Login/Route.php

plugins.trac.wordpress.org/.../src/APIs/Line/Login/Route.php

plugins.trac.wordpress.org/...k/src/APIs/Line/Login/User.php

plugins.trac.wordpress.org/...8/src/APIs/Line/Login/User.php

plugins.trac.wordpress.org/...m-notify&sfp_email=&sfph_mail=

github.com/oberonlai/form-notify/commit/5eab0ea

github.com/oberonlai/form-notify/commit/9780764

cve.org (CVE-2026-5229)

nvd.nist.gov (CVE-2026-5229)

Download JSON