CVE-2026-5112
Deferred Deferred - Pending Action
Unauthenticated Stored XSS in Gravity Forms WordPress Plugin

Publication date: 2026-05-02

Last updated on: 2026-05-05

Assigner: Wordfence

Description
The Gravity Forms plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in versions up to and including 2.10.0. This is due to insufficient input validation and output escaping of Calculation Product field product names when rendered inside Repeater fields. The validate() method in the GF_Field_Calculation class only validates the quantity field (.3) and completely ignores the product name field (.1), allowing malicious HTML to pass through validation. When the value is saved, the sanitize_entry_value() method returns the raw value without sanitization for fields where HTML is not expected. Subsequently, when an entry is viewed in wp-admin, the get_value_entry_detail() method concatenates the unescaped product name directly into the output string, which is then rendered by the repeater's get_value_entry_detail() method without further escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts via form submissions that will execute whenever an authenticated administrator with the gravityforms_view_entries capability accesses the entry detail page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-02
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
rocketgenius gravity_forms to 2.10.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Gravity Forms plugin for WordPress has a vulnerability called Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.10.0. This happens because the plugin does not properly validate or escape input in the Calculation Product field product names when used inside Repeater fields.

Specifically, the validate() method in the GF_Field_Calculation class only checks the quantity field and ignores the product name field, allowing malicious HTML code to pass through. When the form entry is saved, the raw value is stored without sanitization. Later, when an administrator views the entry in the WordPress admin area, the malicious script is rendered and executed because the output is not escaped.

This means an unauthenticated attacker can inject harmful scripts via form submissions that will run in the browser of any authenticated administrator who views the entry details.


How can this vulnerability impact me? :

This vulnerability can allow an unauthenticated attacker to execute arbitrary scripts in the context of an authenticated administrator's browser. This can lead to several impacts including:

  • Theft of administrator session cookies or credentials.
  • Unauthorized actions performed on behalf of the administrator.
  • Potential compromise of the WordPress site’s administrative functions.
  • Injection of malicious content or redirection to malicious sites.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthenticated stored cross-site scripting in the Gravity Forms WordPress plugin versions up to 2.10.0, specifically related to the Calculation Product field product names in Repeater fields.

Detection would involve identifying if the vulnerable plugin version is installed and checking for suspicious or malicious HTML/script content in form submissions, especially in Calculation Product field product names.

Since the vulnerability triggers when an authenticated administrator views entry details, monitoring or scanning form entries for injected scripts could help detect exploitation.

No specific commands or automated detection scripts are provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Gravity Forms plugin to a version later than 2.10.0 where this vulnerability is fixed.

If an update is not immediately possible, restrict access to the WordPress admin area, especially limiting users with the gravityforms_view_entries capability.

Additionally, review and sanitize existing form entries to remove any malicious scripts injected via the Calculation Product field.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to inject arbitrary web scripts that execute when an authenticated administrator views form entries. This could lead to unauthorized access or manipulation of sensitive data within the WordPress admin interface.

Such unauthorized script execution and potential data exposure may impact compliance with standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and breaches.

However, the provided context does not explicitly detail the compliance implications or specific regulatory impacts of this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart