CVE-2026-4987
Payment Amount Bypass in SureForms WordPress Plugin
Publication date: 2026-03-28
Last updated on: 2026-03-28
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The SureForms WordPress plugin, used for creating contact forms, payment forms, and other custom forms, has a vulnerability called Payment Amount Bypass in all versions up to and including 2.5.2.
This vulnerability exists because the function create_payment_intent() validates payment amounts based only on a user-controlled parameter, which means an attacker can manipulate this parameter.
As a result, unauthenticated attackers can bypass the payment amount validation configured in the form and create payment or subscription intents with lower prices by setting the form_id parameter to 0.
How can this vulnerability impact me? :
This vulnerability allows attackers to bypass payment amount validation, enabling them to make payments or subscriptions at a lower cost than intended.
Since the attack can be performed by unauthenticated users over the network with low attack complexity and no user interaction, it poses a significant risk of financial loss.
The integrity of payment transactions is compromised, which can lead to revenue loss for businesses using the SureForms plugin for payment processing.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability involves the SureForms WordPress plugin allowing payment amount bypass via a user-controlled parameter, specifically by setting form_id to 0. Detection would involve monitoring for unusual or unauthorized payment intents where the form_id parameter is set to 0 or other unexpected values.
Since the vulnerability is related to the plugin's payment validation logic, detection on the network or system could include inspecting HTTP requests to the WordPress site for suspicious payment form submissions with form_id=0.
Suggested commands to detect such activity might include using web server logs or network traffic analysis tools to search for requests containing 'form_id=0' in POST or GET parameters.
- grep -r 'form_id=0' /var/log/apache2/access.log
- grep -r 'form_id=0' /var/log/nginx/access.log
- tcpdump -A -s 0 'tcp port 80 or tcp port 443' | grep 'form_id=0'
Additionally, reviewing plugin logs or WordPress debug logs for payment attempts with unusual parameters may help detect exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to update the SureForms WordPress plugin to version 2.6.0 or later, as this version includes comprehensive security fixes addressing the payment amount bypass vulnerability.
If immediate updating is not possible, consider temporarily disabling the payment functionality of the plugin or restricting access to the payment forms until the update can be applied.
Additionally, monitor payment transactions for suspicious activity, especially those with underpriced amounts or unusual form_id values.
Implementing web application firewall (WAF) rules to block requests with form_id=0 or other suspicious parameters may also help mitigate exploitation attempts.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in the SureForms plugin allows unauthenticated attackers to bypass payment amount validation, potentially leading to underpriced payment or subscription intents. While the CVE description and resources do not explicitly mention compliance with standards such as GDPR or HIPAA, the ability to manipulate payment amounts without proper validation could indirectly impact compliance by undermining financial transaction integrity and potentially exposing payment processing systems to fraud.
However, there is no direct information provided about how this vulnerability affects compliance with specific regulations like GDPR or HIPAA.