Description
The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'table' parameter in all versions up to, and including, 9.1.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-05-15
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The NEX-Forms – Ultimate Forms Plugin for WordPress contains a time‑based blind SQL injection in versions up to 9.1.12. The flaw stems from insufficient escaping of the 'table' parameter inside an existing SQL query, allowing an attacker who can authenticate with administrator‑level privileges to append arbitrary SQL statements to the query. This can be used to read sensitive data from the database and potentially alter or delete it. The vulnerability is classified as CWE-89, representing an injection flaw with the potential to compromise data confidentiality and integrity.

Affected Systems

The affected product is Webaways’ NEX-Forms – Ultimate Forms Plugin for WordPress, specifically any installation running version 9.1.12 or earlier. No other vendors or products are listed as impacted.

Risk and Exploitability

The CVSS score of 4.9 indicates a medium level of severity, and the EPSS score is not available, suggesting current exploitation data is not documented. The vulnerability is not listed in the CISA KEV catalog, meaning no known public exploits are recorded. The attack vector requires an authenticated administrator or higher, which limits exposure to sites with weak account control. Nonetheless, any administrator account with access to the plugin could exploit the flaw to extract or modify data, making the risk significant for sites that keep the plugin at or below version 9.1.12.

Generated by OpenCVE AI on May 15, 2026 at 10:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the NEX-Forms plugin to version 9.1.13 or later, which removes the vulnerable parameter handling.
  • If an upgrade cannot be performed immediately, restrict access to the plugin’s admin interface to only essential administrators and monitor for suspicious query patterns; consider disabling the 'table' parameter function via custom code or a firewall rule.
  • Deploy a web application firewall rule or plugin that blocks SQL injection patterns on all endpoints, and verify that the 'table' parameter is not being used in malicious queries.

Generated by OpenCVE AI on May 15, 2026 at 10:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Webaways
Webaways nex-forms-ultimate-forms-plugin
Wordpress
Wordpress wordpress
Vendors & Products Webaways
Webaways nex-forms-ultimate-forms-plugin
Wordpress
Wordpress wordpress

Fri, 15 May 2026 09:00:00 +0000

Type Values Removed Values Added
Description The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'table' parameter in all versions up to, and including, 9.1.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title NEX-Forms – Ultimate Forms Plugin for WordPress <= 9.1.12 - Authenticated (Administrator+) SQL Injection via 'table' Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Webaways Nex-forms-ultimate-forms-plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-15T13:27:19.386Z

Reserved: 2026-04-25T17:06:32.082Z

Link: CVE-2026-7046

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-15T09:16:17.250

Modified: 2026-05-15T14:09:15.910

Link: CVE-2026-7046

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T11:15:25Z

Weaknesses