CVE-2026-5113
Deferred Deferred - Pending Action
Stored XSS in Gravity Forms WordPress Plugin

Publication date: 2026-05-02

Last updated on: 2026-05-05

Assigner: Wordfence

Description
The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Consent field hidden inputs in versions up to and including 2.10.0. This is due to a flawed state validation mechanism that fails open when input is sanitized by wp_kses(), combined with insufficient output escaping. The state validation logic creates two hashes (raw input and wp_kses-sanitized input) and only fails validation if BOTH hashes don't match the original state. When an attacker injects XSS payloads using tags stripped by wp_kses() (like <svg>), the sanitized hash matches while the malicious raw value is preserved and saved to the database. When administrators view the Entries List page, the stored malicious consent label is retrieved and output without escaping, causing the XSS payload to execute. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in entries that will execute whenever an authenticated administrator accesses the entries list page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-02
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gravity_forms gravity_forms to 2.10.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Gravity Forms plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in versions up to and including 2.10.0. This occurs because of a flawed state validation mechanism involving consent field hidden inputs. The validation creates two hashes: one from the raw input and one from the sanitized input using wp_kses(). It only fails validation if both hashes do not match the original state. Attackers can inject malicious scripts using tags that wp_kses() strips (like <svg>), causing the sanitized hash to match while the malicious raw input is saved in the database. When an administrator views the Entries List page, the malicious script executes because the stored consent label is output without proper escaping.


How can this vulnerability impact me? :

This vulnerability allows unauthenticated attackers to inject arbitrary web scripts into Gravity Forms entries. These scripts execute whenever an authenticated administrator views the Entries List page, potentially leading to unauthorized actions, data theft, or compromise of the administrator's session. This can result in loss of control over the WordPress site, data breaches, or further exploitation.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability affects Gravity Forms plugin versions up to and including 2.10.0. Immediate mitigation involves updating the Gravity Forms plugin to a version later than 2.10.0 where this vulnerability is fixed.

Since the vulnerability allows unauthenticated attackers to inject stored XSS payloads via consent field hidden inputs, restricting access to the Entries List page to trusted administrators and monitoring for suspicious entries can help reduce risk until the plugin is updated.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Gravity Forms allows unauthenticated attackers to inject stored cross-site scripting (XSS) payloads that execute when an authenticated administrator views the entries list page. This can lead to unauthorized script execution within the administrative interface.

Such a vulnerability could potentially impact compliance with standards and regulations like GDPR and HIPAA because it may lead to unauthorized access or manipulation of sensitive data stored within the form entries. XSS attacks can be used to steal session tokens, manipulate data, or perform actions on behalf of administrators, thereby compromising data integrity and confidentiality.

However, the provided context and resources do not explicitly discuss the direct impact of this vulnerability on compliance with GDPR, HIPAA, or other common standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart