Description
The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via POST parameter key names in the submit_nex_form() function in versions up to, and including, 9.1.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-05-03
Score: 7.2 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The NEX‑Forms – Ultimate Forms Plugin for WordPress allows an unauthenticated attacker to store arbitrary JavaScript by placing malicious code in the names of POST parameters. When these pages are subsequently viewed, the unescaped script is executed in the victim’s browser, providing a classic stored XSS vector that can be used for session hijacking, credential theft or malicious redirects. This weakness is classified as CWE‑79 and represents a direct compromise of the user’s browser environment.

Affected Systems

The vulnerability affects the NEX‑Forms – Ultimate Forms Plugin for WordPress, specifically versions up to and including 9.1.11. No additional version information is provided in the advisory.

Risk and Exploitability

The CVSS score of 7.2 places this flaw in the high‑severity range. Because the EPSS score is not available, the empirical likelihood of exploitation cannot be quantified, but the absence of a KEV listing suggests no widely known active exploits yet. The attack can be carried out without authentication by sending a crafted POST request to the form submission endpoint, making it relatively straightforward to exploit for any visitor with access to an affected form page.

Generated by OpenCVE AI on May 3, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the NEX‑Forms plugin to the latest version that contains the XSS fix.
  • If an immediate upgrade is not possible, deactivate or remove the plugin until a patched release is applied.
  • Validate and whitelist all form field names, limiting them to safe alphanumeric characters before processing or rendering their values.

Generated by OpenCVE AI on May 3, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 03 May 2026 05:45:00 +0000

Type Values Removed Values Added
Description The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via POST parameter key names in the submit_nex_form() function in versions up to, and including, 9.1.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title NEX-Forms <= 9.1.11 - Unauthenticated Stored Cross-Site Scripting via POST Parameter Key Names
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-03T04:25:49.917Z

Reserved: 2026-03-27T20:10:36.015Z

Link: CVE-2026-5063

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-03T06:15:57.650

Modified: 2026-05-03T06:15:57.650

Link: CVE-2026-5063

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-03T06:30:05Z

Weaknesses