Description
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.2.0 via the exportEntries function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Fluent Forms manager-level access and above, to bypass form-level access restrictions to access submissions from forms they are not authorized to view, export data from arbitrary database tables, and enumerate database table names via error message disclosure.
Published: 2026-05-14
Score: 8.2 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in the Fluent Forms plugin for WordPress is an insecure direct object reference in its exportEntries function. A missing validation on the user‑controlled "table" key lets any authenticated user with manager‑level or higher permissions bypass form‑level restrictions, retrieve submissions from hidden forms, export data from arbitrary database tables, and enumerate table names via error messages. The result is unauthorized disclosure of potentially sensitive user data and full database visibility, which breaches confidentiality and can reveal personal or business information.

Affected Systems

The flaw affects the TechJewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin in every version up to and including 6.2.0. Any WordPress site installing the plugin at these or earlier versions is vulnerable, provided the user has at least manager‑level access to the plugin.

Risk and Exploitability

The CVSS score of 8.2 marks the vulnerability as high severity. Although no EPSS score is available, the exploit requires only valid credentials with manager‑level permissions that are typically granted to site administrators or advanced collaborators, making the attack probability significant. The flaw is triggered through normal plugin usage and requires no special network exploitation, and it is not yet listed in CISA’s KEV catalog, indicating no known large‑scale exploitation. However, the absence of proper access checks and the ability to enumerate database tables give an attacker a direct pathway to sensitive data disclosure.

Generated by OpenCVE AI on May 14, 2026 at 08:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an update to Fluent Forms to version 6.3.0 or newer, which fixes the insecure direct object reference in exportEntries.
  • If immediate updating is not possible, revoke or limit manager‑level access for users that do not need it, and disable the exportEntries functionality for those roles.
  • Inspect any custom code or third‑party extensions that call exportEntries and modify or remove the vulnerable "table" parameter checks.

Generated by OpenCVE AI on May 14, 2026 at 08:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Techjewel
Techjewel fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
Wordpress
Wordpress wordpress
Vendors & Products Techjewel
Techjewel fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
Wordpress
Wordpress wordpress

Thu, 14 May 2026 07:00:00 +0000

Type Values Removed Values Added
Description The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.2.0 via the exportEntries function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Fluent Forms manager-level access and above, to bypass form-level access restrictions to access submissions from forms they are not authorized to view, export data from arbitrary database tables, and enumerate database table names via error message disclosure.
Title Fluent Forms <= 6.2.0 - Authenticated (Subscriber+) Authorization Bypass via 'table' Parameter
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


Subscriptions

Techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-14T06:44:12.291Z

Reserved: 2026-04-01T23:36:22.038Z

Link: CVE-2026-5395

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-14T07:16:20.247

Modified: 2026-05-14T07:16:20.247

Link: CVE-2026-5395

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T08:30:16Z

Weaknesses