Description
The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 2.10.0. This is due to insufficient input validation and output escaping on Hidden Product field values when used inside Repeater fields, where repeater subfields bypass state validation checks and the Hidden Product validate() method only validates the quantity field while ignoring the product name field that is later output without proper escaping in the get_value_entry_detail() method. This makes it possible for unauthenticated attackers to inject arbitrary web scripts through form submissions that will execute whenever an administrator views the entry details.
Published: 2026-05-02
Score: 7.2 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw that originates from the Hidden Product field inside Repeater subfields. When attackers submit a form, the product name is stored without proper validation or escaping, and later displayed within the form entry details. As a result, arbitrary scripts can execute whenever an administrator views the entry, allowing the attacker to run code in the context of the WP interface.

Affected Systems

The flaw affects the Gravity Forms plugin for WordPress versions 2.10.0 and earlier. Any site deploying Gravity Forms in those periods—particularly those using repeater fields with hidden product inputs—could be compromised. The vulnerability is exploitable during normal form usage and does not require elevated privileges to insert the malicious payload.

Risk and Exploitability

The CVSS score of 7.2 indicates a high‑severity condition. Because the flaw is unauthenticated and is triggered through publicly accessible forms, the likelihood of exploitation is significant, even though no EPSS figure is available. The attack vector is inferred to be remote via HTTP/S to the site’s WordPress frontend, and the issue is not noted in the CISA KEV catalog. Administrators should treat this as a serious risk requiring prompt remediation.

Generated by OpenCVE AI on May 2, 2026 at 10:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Gravity Forms to a version newer than 2.10.0 to eliminate the vulnerable code paths.
  • Disable or limit public exposure of any forms that employ repeater fields with hidden product fields, or ensure that those fields are removed or properly escaped by custom code.
  • Review existing form entries for injected scripts and delete or sanitize any that contain suspicious content.

Generated by OpenCVE AI on May 2, 2026 at 10:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Gravityforms
Gravityforms gravity Forms
Wordpress
Wordpress wordpress
Vendors & Products Gravityforms
Gravityforms gravity Forms
Wordpress
Wordpress wordpress

Sat, 02 May 2026 06:00:00 +0000

Type Values Removed Values Added
Description The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 2.10.0. This is due to insufficient input validation and output escaping on Hidden Product field values when used inside Repeater fields, where repeater subfields bypass state validation checks and the Hidden Product validate() method only validates the quantity field while ignoring the product name field that is later output without proper escaping in the get_value_entry_detail() method. This makes it possible for unauthenticated attackers to inject arbitrary web scripts through form submissions that will execute whenever an administrator views the entry details.
Title Gravity Forms <= 2.10.0 - Unauthenticated Stored Cross-Site Scripting via Hidden Product Field in Repeater
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Gravityforms Gravity Forms
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-02T05:29:29.928Z

Reserved: 2026-03-29T21:39:37.259Z

Link: CVE-2026-5111

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T06:16:03.730

Modified: 2026-05-02T06:16:03.730

Link: CVE-2026-5111

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T10:15:16Z

Weaknesses