VULNERABILITY BRIEF
CVE-2026-0996
المصدر الرسمي: NVD
مستوى الخطورة
متوسطة (Medium)
درجة CVSS
6,4
حالة الاستغلال KEV
غير مدرجة حاليًا
تاريخ النشر
2026-02-10
وصف الثغرة
الأثر المحتمل
التوصيات والمعالجة
حالة الاستغلال (KEV)
لا يوجد إدراج حاليًا في قائمة KEV.
المراجع الرسمية
- https://plugins.trac.wordpress.org/browser/fluentform/tags/6.1.12/app/Hooks/actions.php#L641
- https://plugins.trac.wordpress.org/browser/fluentform/tags/6.1.12/app/Modules/Ai/AiFormBuilder.php#L29
- https://plugins.trac.wordpress.org/browser/fluentform/tags/6.1.12/app/Modules/Ai/AiFormBuilder.php#L334
- https://plugins.trac.wordpress.org/browser/fluentform/tags/6.1.12/boot/globals.php#L438
- https://plugins.trac.wordpress.org/changeset/3449710/fluentform/trunk/app/Hooks/actions.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/00192a36-4b75-4dae-9a6e-0afb02ed5bad?source=cve
English Technical Fields
Description: The Fluent Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the AI Form Builder module in all versions up to, and including, 6.1.14 due to a combination of missing authorization checks, a leaked nonce, and insufficient input sanitization. The vulnerability allows Subscriber-level users to trigger AI form generation via a protected endpoint. When prompted, AI services will typically return bare JavaScript code (without <script> tags), which bypasses the plugin's sanitization. This stored JavaScript executes whenever anyone views the generated form, making it possible for authenticated attackers with Subscriber-level access and above to inject arbitrary web scripts that will execute in the context of any user accessing the form.
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N