Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-5113— Gravity Forms <= 2.10.0 - Unauthenticated Stored Cross-Site Scripting via Consent Field Hidden Input

CVSS 7.2 · High EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-5113

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Gravity Forms <= 2.10.0 - Unauthenticated Stored Cross-Site Scripting via Consent Field Hidden Input
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Consent field hidden inputs in versions up to and including 2.10.0. This is due to a flawed state validation mechanism that fails open when input is sanitized by wp_kses(), combined with insufficient output escaping. The state validation logic creates two hashes (raw input and wp_kses-sanitized input) and only fails validation if BOTH hashes don't match the original state. When an attacker injects XSS payloads using tags stripped by wp_kses() (like <svg>), the sanitized hash matches while the malicious raw value is preserved and saved to the database. When administrators view the Entries List page, the stored malicious consent label is retrieved and output without escaping, causing the XSS payload to execute. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in entries that will execute whenever an authenticated administrator accesses the entries list page.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress plugin Gravity Forms 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin Gravity Forms 2.10.0及之前版本存在跨站脚本漏洞,该漏洞源于Consent字段隐藏输入的状态验证机制缺陷和输出转义不足,可能导致未经身份验证的攻击者在条目中注入任意Web脚本,当认证管理员访问条目列
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Gravity FormsGravity Forms 0 ~ 2.10.0 -

II. Public POCs for CVE-2026-5113

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-5113

登录查看更多情报信息。

Same Patch Batch · Gravity Forms · 2026-05-02 · 5 CVEs total

CVE-2026-51117.2 HIGHGravity Forms <= 2.10.0 - Unauthenticated Stored Cross-Site Scripting via Hidden Product F
CVE-2026-51127.2 HIGHGravity Forms <= 2.10.0 - Unauthenticated Stored Cross-Site Scripting via Calculation Prod
CVE-2026-51107.2 HIGHGravity Forms <= 2.10.0 - Unauthenticated Stored Cross-Site Scripting via Single Product F
CVE-2026-51097.2 HIGHGravity Forms <= 2.10.0 - Unauthenticated Stored Cross-Site Scripting via Product Option

IV. Related Vulnerabilities

V. Comments for CVE-2026-5113

No comments yet


Leave a comment