Description
The Stripe Payment Forms by WP Full Pay – Accept Credit Card Payments, Donations & Subscriptions plugin for WordPress is vulnerable to SQL Injection via the 'wpfs-form-name' parameter in all versions up to, and including, 8.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2025-10-25
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Data Access via SQL Injection
Action: Apply Patch
AI Analysis

Impact

The plugin "Stripe Payment Forms by WP Full Pay – Accept Credit Card Payments, Donations & Subscriptions" is vulnerable to unauthenticated SQL injection through the 'wpfs-form-name' parameter. The lack of escaping and insufficient use of prepared statements allow an attacker to append arbitrary SQL to existing queries, potentially extracting sensitive data from the database. This flaw is classified as CWE‑89.

Affected Systems

WordPress sites using the Themeisle Stripe Payment Forms plugin up to and including version 8.3.1 are affected. The vulnerability applies to all forms that accept the 'wpfs-form-name' field.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity vulnerability. The EPSS score of less than 1% suggests a low likelihood of exploitation today, and the issue is not listed in CISA KEV. Attackers can exploit this flaw without authentication by submitting crafted requests to the plugin’s forms, which are typically accessible to all site visitors. The potential impact is the disclosure of database contents, including payment information.

Generated by OpenCVE AI on April 21, 2026 at 02:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Stripe Payment Forms plugin to version 8.3.2 or later.
  • Validate or sanitize the 'wpfs-form-name' input on the server side, using prepared statements or parameterization.
  • Deploy a web‑application‑firewall rule that detects and blocks common SQL injection payloads targeting the plugin’s endpoints.

Generated by OpenCVE AI on April 21, 2026 at 02:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Themeisle
Themeisle stripe Payment Forms
Wordpress
Wordpress wordpress
Vendors & Products Themeisle
Themeisle stripe Payment Forms
Wordpress
Wordpress wordpress

Mon, 27 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 25 Oct 2025 07:00:00 +0000

Type Values Removed Values Added
Description The Stripe Payment Forms by WP Full Pay – Accept Credit Card Payments, Donations & Subscriptions plugin for WordPress is vulnerable to SQL Injection via the 'wpfs-form-name' parameter in all versions up to, and including, 8.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Stripe Payment Forms <= 8.3.1 - Unauthenticated SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Themeisle Stripe Payment Forms
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:16.912Z

Reserved: 2025-08-21T19:32:17.388Z

Link: CVE-2025-9322

cve-icon Vulnrichment

Updated: 2025-10-27T15:44:19.345Z

cve-icon NVD

Status : Deferred

Published: 2025-10-25T07:15:41.723

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9322

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:15:06Z

Weaknesses