Description
Missing Authorization vulnerability in Shahjahan Jewel FluentForm fluentform allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FluentForm: from n/a through <= 6.1.14.
Published: 2026-02-19
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access and Potential Data Exposure
Action: Patch
AI Analysis

Impact

The vulnerability is a missing authorization flaw in the FluentForm plugin. It allows attackers to bypass configured access control levels, potentially accessing or manipulating forms and data that should be restricted. This flaw maps to CWE‑862 and can lead to unauthorized disclosure, modification, or deletion of sensitive form content.

Affected Systems

All installations of the WordPress FluentForm plugin by Shahjahan Jewel using version 6.1.14 or earlier are affected. No version prior to 6.1.15 is vulnerable. The flaw spans from the earliest available release through the listed maximum version, and there is no known partial patch for intermediate releases.

Risk and Exploitability

The CVSS score of 4.3 reflects a low‑to‑moderate risk, and the EPSS score of less than 1% indicates a very low likelihood of exploitation in the field. The vulnerability is not present in CISA’s KEV catalog. The likely attack vector is a web attacker sending crafted HTTP requests to privileged plugin endpoints, exploiting the broken access control to read or modify form data without proper authorization. Because the flaw bypasses the plugin’s internal permission checks, an attacker with minimal or no credentials could potentially gain unauthorized access to sensitive forms or user data.

Generated by OpenCVE AI on April 16, 2026 at 00:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the FluentForm plugin to a version newer than 6.1.14 (ideally 6.1.15 or later) to apply the vendor‑supplied fix for the access control flaw.
  • If an immediate update is not possible, temporarily restrict access to the plugin’s administrative interface by limiting the IP range that can reach the site or by using a WordPress security plugin to enforce stricter role‑based controls for form management.
  • Review and audit WordPress user roles and capabilities, ensuring that only trusted administrators have permission to add or edit forms, and remove unnecessary high‑privilege roles from non‑admin users.

Generated by OpenCVE AI on April 16, 2026 at 00:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Shahjahan Jewel
Shahjahan Jewel fluentform
Wordpress
Wordpress wordpress
Vendors & Products Shahjahan Jewel
Shahjahan Jewel fluentform
Wordpress
Wordpress wordpress

Thu, 19 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Shahjahan Jewel FluentForm fluentform allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FluentForm: from n/a through <= 6.1.14.
Title WordPress FluentForm plugin <= 6.1.14 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Shahjahan Jewel Fluentform
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:54.620Z

Reserved: 2026-02-02T12:20:39.016Z

Link: CVE-2026-25313

cve-icon Vulnrichment

Updated: 2026-02-20T16:48:48.000Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T09:16:15.490

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-25313

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T00:45:15Z

Weaknesses