Description
The HTML Forms – Simple WordPress Forms Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: 2025-11-08
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Immediately
AI Analysis

Impact

The HTML Forms – Simple WordPress Forms Plugin contains a stored cross‑site scripting flaw that originates from insufficient input sanitization and output escaping in the admin settings interface. An attacker who is already authenticated with administrator‑level or higher privileges can inject arbitrary JavaScript into the plugin configuration, which then persists and executes whenever a site visitor loads the affected page. This can lead to session hijacking, credential theft, defacement, or other client‑side attacks against users of the site.

Affected Systems

This vulnerability affects installations of the LinkSoftware HTML Forms – Simple WordPress Forms Plugin for WordPress version 1.5.5 and earlier, specifically on multi‑site WordPress networks where the unfiltered_html capability is disabled. Any site running these versions on a multi‑site setup is susceptible if an attacker has administrative access.

Risk and Exploitability

The flaw has a CVSS score of 4.4, indicating a low to moderate severity, and an EPSS score of less than 1 %, suggesting a low probability of exploitation in the wild. It is not listed in the CISA KEV catalog. Exploitation requires administrative privileges and a multi‑site environment with unfiltered_html disabled, making the attack vector authenticated and limited. Nevertheless, the impact on end‑user browsers can be significant, and the low exploit likelihood does not mitigate the need for remediation.

Generated by OpenCVE AI on April 21, 2026 at 01:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the HTML Forms plugin to the latest version (≥ 1.5.6) to remove the stored XSS vulnerability.
  • Ensure the WordPress multi‑site network restricts the unfiltered_html capability or remove it from roles that have access to the plugin configuration.
  • Re‑validate that all admin input fields for the plugin are properly sanitized and HTML‑escaped; if the upgrade cannot be performed immediately, temporarily restrict or disable the plugin to prevent the insertion of malicious scripts.

Generated by OpenCVE AI on April 21, 2026 at 01:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 10 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 10 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Linksoftware
Linksoftware html Forms
Wordpress
Wordpress wordpress
Vendors & Products Linksoftware
Linksoftware html Forms
Wordpress
Wordpress wordpress

Sat, 08 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The HTML Forms – Simple WordPress Forms Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Title HTML Forms <= 1.5.5 - Authenticated (Admin+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Linksoftware Html Forms
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:34:12.801Z

Reserved: 2025-10-23T18:27:04.748Z

Link: CVE-2025-12125

cve-icon Vulnrichment

Updated: 2025-11-10T19:35:49.965Z

cve-icon NVD

Status : Deferred

Published: 2025-11-08T04:15:44.487

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12125

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:00:12Z

Weaknesses