CVE-2026-4987
Received Received - Intake
Payment Amount Bypass in SureForms WordPress Plugin

Publication date: 2026-03-28

Last updated on: 2026-03-28

Assigner: Wordfence

Description
The SureForms – Contact Form, Payment Form & Other Custom Form Builder plugin for WordPress is vulnerable to Payment Amount Bypass in all versions up to, and including, 2.5.2. This is due to the create_payment_intent() function performing a payment validation solely based on the value of a user-controlled parameter. This makes it possible for unauthenticated attackers to bypass configured form payment-amount validation and create underpriced payment/subscription intents by setting form_id to 0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-28
Last Modified
2026-03-28
Generated
2026-05-07
AI Q&A
2026-03-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The SureForms WordPress plugin, used for creating contact forms, payment forms, and other custom forms, has a vulnerability called Payment Amount Bypass in all versions up to and including 2.5.2.

This vulnerability exists because the function create_payment_intent() validates payment amounts based only on a user-controlled parameter, which means an attacker can manipulate this parameter.

As a result, unauthenticated attackers can bypass the payment amount validation configured in the form and create payment or subscription intents with lower prices by setting the form_id parameter to 0.


How can this vulnerability impact me? :

This vulnerability allows attackers to bypass payment amount validation, enabling them to make payments or subscriptions at a lower cost than intended.

Since the attack can be performed by unauthenticated users over the network with low attack complexity and no user interaction, it poses a significant risk of financial loss.

The integrity of payment transactions is compromised, which can lead to revenue loss for businesses using the SureForms plugin for payment processing.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability involves the SureForms WordPress plugin allowing payment amount bypass via a user-controlled parameter, specifically by setting form_id to 0. Detection would involve monitoring for unusual or unauthorized payment intents where the form_id parameter is set to 0 or other unexpected values.

Since the vulnerability is related to the plugin's payment validation logic, detection on the network or system could include inspecting HTTP requests to the WordPress site for suspicious payment form submissions with form_id=0.

Suggested commands to detect such activity might include using web server logs or network traffic analysis tools to search for requests containing 'form_id=0' in POST or GET parameters.

  • grep -r 'form_id=0' /var/log/apache2/access.log
  • grep -r 'form_id=0' /var/log/nginx/access.log
  • tcpdump -A -s 0 'tcp port 80 or tcp port 443' | grep 'form_id=0'

Additionally, reviewing plugin logs or WordPress debug logs for payment attempts with unusual parameters may help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update the SureForms WordPress plugin to version 2.6.0 or later, as this version includes comprehensive security fixes addressing the payment amount bypass vulnerability.

If immediate updating is not possible, consider temporarily disabling the payment functionality of the plugin or restricting access to the payment forms until the update can be applied.

Additionally, monitor payment transactions for suspicious activity, especially those with underpriced amounts or unusual form_id values.

Implementing web application firewall (WAF) rules to block requests with form_id=0 or other suspicious parameters may also help mitigate exploitation attempts.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in the SureForms plugin allows unauthenticated attackers to bypass payment amount validation, potentially leading to underpriced payment or subscription intents. While the CVE description and resources do not explicitly mention compliance with standards such as GDPR or HIPAA, the ability to manipulate payment amounts without proper validation could indirectly impact compliance by undermining financial transaction integrity and potentially exposing payment processing systems to fraud.

However, there is no direct information provided about how this vulnerability affects compliance with specific regulations like GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart