Description
The Fluent Forms plugin for WordPress is vulnerable to Arbitrary File Read in versions up to and including 6.2.1. This is due to insufficient path validation in the getAttachments() method of EmailNotificationActions, which resolves attacker-supplied file-upload URLs into filesystem paths without verifying that the resolved path stays inside the WordPress uploads directory: a strpos() prefix check on the raw URL can be bypassed with traversal sequences, wp_normalize_path() does not resolve ".\..\" segments, and file_exists() then resolves them at the kernel level. This makes it possible for authenticated attackers with administrator access to read arbitrary files readable by the web-server user — including wp-config.php with its database credentials and authentication salts — by submitting a form whose admin notification is configured to attach a file-upload field and supplying a crafted URL of the shape <upload_baseurl>/../../<target> as the file-field value. The resolved file is attached to the outbound admin-notification email via wp_mail(). While the email can be triggered by unauthenticated users, the email recipient is not user-controlled.
Published: 2026-05-06
Score: 4.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a CWE-22 path traversal flaw. Fluent Forms versions up to and including 6.2.1 allow an authenticated administrator to read arbitrary files that the web‑server can access. The flaw originates in the getAttachments() method of EmailNotificationActions, where attacker‑supplied file‑upload URLs are converted to filesystem paths without proper validation. A bypass of the prefix check using traversal sequences, coupled with wp_normalize_path() not resolving '.' or '..' segments, permits a crafted URL of the form <upload_baseurl>/../../<target> to be resolved to an arbitrary target file. The resolved file is then attached to an outbound admin‑notification email via wp_mail(), enabling data disclosure. Although an unauthenticated user can trigger the email, the recipient address is not user‑controlled, so the attack remains limited to the administrator’s email.

Affected Systems

The plugin "Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder" from techjewel is affected. All releases up to and including version 6.2.1 are impacted. The vulnerability is active only when an admin‑notification email is configured to attach a file‑upload field and an authenticated administrator submits a form containing a crafted file‑upload URL.

Risk and Exploitability

The CVSS score of 4.9 reflects moderate severity. No EPSS score is currently available, and the vulnerability is not listed in CISA's KEV catalog. Exploitation requires administrator‑level access to the WordPress site so that a form submission with a malicious file‑upload URL can be made. After the email is sent, the unvalidated file is attached, providing the attacker with the contents of any file readable by the web‑server, including sensitive configuration files. While the risk is moderate to low in terms of the broader attack surface, the impact of reading wp‑config.php makes the vulnerability significant for privileged users.

Generated by OpenCVE AI on May 6, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Fluent Forms to version 6.2.2 or newer, which contains proper path validation in EmailNotificationActions.
  • If an upgrade is not immediately possible, disable all admin‑notification email settings that attach file‑upload fields until the patch is applied.
  • Restrict file permissions on the WordPress uploads directory so that only required files are readable by the web‑server user and prevent sensitive files from being exposed through the uploads path.
  • Consider disabling file uploads entirely or configuring the plugin’s security settings to reject external URLs in attachments to mitigate path traversal attempts.

Generated by OpenCVE AI on May 6, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Techjewel
Techjewel fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
Wordpress
Wordpress wordpress
Vendors & Products Techjewel
Techjewel fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
Wordpress
Wordpress wordpress

Wed, 06 May 2026 07:30:00 +0000

Type Values Removed Values Added
Description The Fluent Forms plugin for WordPress is vulnerable to Arbitrary File Read in versions up to and including 6.2.1. This is due to insufficient path validation in the getAttachments() method of EmailNotificationActions, which resolves attacker-supplied file-upload URLs into filesystem paths without verifying that the resolved path stays inside the WordPress uploads directory: a strpos() prefix check on the raw URL can be bypassed with traversal sequences, wp_normalize_path() does not resolve ".\..\" segments, and file_exists() then resolves them at the kernel level. This makes it possible for authenticated attackers with administrator access to read arbitrary files readable by the web-server user — including wp-config.php with its database credentials and authentication salts — by submitting a form whose admin notification is configured to attach a file-upload field and supplying a crafted URL of the shape <upload_baseurl>/../../<target> as the file-field value. The resolved file is attached to the outbound admin-notification email via wp_mail(). While the email can be triggered by unauthenticated users, the email recipient is not user-controlled.
Title Fluent Forms <= 6.2.1 - Authenticated (Administrator+) Arbitrary File Read via Path Traversal in Email Attachment
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-06T06:47:20.113Z

Reserved: 2026-04-15T10:43:33.977Z

Link: CVE-2026-6344

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T08:16:03.813

Modified: 2026-05-06T08:16:03.813

Link: CVE-2026-6344

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T10:30:35Z

Weaknesses