CVE-2026-8692
Authorization Bypass in Vedrixa Forms WordPress Plugin
Publication date: 2026-05-22
Last updated on: 2026-05-22
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| vedrixa | forms | to 1.1.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Vedrixa Forms plugin for WordPress has an authorization bypass vulnerability in all versions up to 1.1.1. This means the plugin does not properly verify if a user is authorized to perform certain actions. As a result, any authenticated user with subscriber-level access or higher can modify the structure of any form by adding, removing, or changing fields. This is possible because the security token ('ajax-nonce') used to protect these actions is publicly accessible to any authenticated user who visits a page with a form shortcode.
How can this vulnerability impact me? :
This vulnerability allows attackers with low-level authenticated access to alter form structures on your WordPress site. They can add, remove, or modify form fields, potentially leading to data integrity issues, unauthorized data collection, or disruption of form functionality. Since the attacker can control form fields, this could be exploited to gather sensitive information or interfere with normal site operations.