CVE-2026-5118
Deferred Deferred - Pending Action
Privilege Escalation in Divi Form Builder WordPress Plugin

Publication date: 2026-05-21

Last updated on: 2026-05-21

Assigner: Wordfence

Description
The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.2. This is due to the plugin accepting a user-controlled 'role' parameter from POST data during user registration without validating it against the form's configured default_user_role setting. This makes it possible for unauthenticated attackers to create administrator accounts by tampering with the role parameter during registration.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-21
Last Modified
2026-05-21
Generated
2026-05-21
AI Q&A
2026-05-21
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
divi_engine divi_form_builder to 5.1.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Divi Form Builder plugin for WordPress has a vulnerability in versions up to and including 5.1.2 where it accepts a user-controlled 'role' parameter during user registration without validating it against the form's configured default user role.

This flaw allows unauthenticated attackers to manipulate the 'role' parameter in POST data to create accounts with administrator privileges, effectively escalating their privileges beyond what is intended.


How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows attackers to create administrator accounts without authentication.

  • Attackers can gain full control over the affected WordPress site.
  • They can modify site content, install malicious plugins or themes, and access sensitive data.
  • It can lead to complete compromise of the website's integrity, confidentiality, and availability.

What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should immediately update the Divi Form Builder plugin to version 5.1.3 or later.

The update fixes the issue by enforcing the role assignments as configured in the form settings, preventing unauthorized privilege escalation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to create administrator accounts by exploiting privilege escalation in the Divi Form Builder plugin. This unauthorized access to administrative privileges can lead to unauthorized data access, modification, or deletion.

Such unauthorized access and potential data breaches can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict access controls and protection of sensitive data.

Failure to prevent privilege escalation and unauthorized administrative access may result in violations of these regulations, leading to legal and financial consequences.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart