CVE-2026-8692
Received Received - Intake
Authorization Bypass in Vedrixa Forms WordPress Plugin

Publication date: 2026-05-22

Last updated on: 2026-05-22

Assigner: Wordfence

Description
The Vedrixa Forms – User Registration Form, Signup Form & Drag & Drop Form Builder plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to overwrite the structure of any form β€” adding, removing, or altering fields β€” by writing attacker-controlled data to the plugin's FORMS database table. The 'ajax-nonce' nonce used by this handler is injected into the public frontend via wp_localize_script(), so any authenticated user who visits a page containing a form shortcode can obtain it without any elevated access.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-22
Last Modified
2026-05-22
Generated
2026-05-22
AI Q&A
2026-05-22
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
vedrixa forms to 1.1.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Vedrixa Forms plugin for WordPress has an authorization bypass vulnerability in all versions up to 1.1.1. This means the plugin does not properly verify if a user is authorized to perform certain actions. As a result, any authenticated user with subscriber-level access or higher can modify the structure of any form by adding, removing, or changing fields. This is possible because the security token ('ajax-nonce') used to protect these actions is publicly accessible to any authenticated user who visits a page with a form shortcode.


How can this vulnerability impact me? :

This vulnerability allows attackers with low-level authenticated access to alter form structures on your WordPress site. They can add, remove, or modify form fields, potentially leading to data integrity issues, unauthorized data collection, or disruption of form functionality. Since the attacker can control form fields, this could be exploited to gather sensitive information or interfere with normal site operations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart