All 24 CVE vulnerabilities found in Forminator Forms – Contact Form, Payment Form & Custom Form Builder, with AI-generated Chinese analysis, references, and POCs.
This page aggregates known security vulnerabilities and weakness classifications for the Forminator Forms product, a popular WordPress plugin for creating contact, payment, and custom forms. The content specifically addresses flaws related to cross-site scripting, privilege escalation, and injection attacks within the context of this widely used form builder solution. The vulnerabilities collected on this page span from the plugin’s initial releases up to the most recent disclosures, providing a comprehensive historical record of security issues. This timeframe includes both critical flaws that allow remote code execution and lower-severity issues affecting data integrity or user access controls. By consolidating these entries, the page offers a unified view of the product’s security posture over time, helping developers and site administrators understand the evolution of risks associated with this specific toolset. Readers can utilize this resource to track the vendor’s security advisory history and assess how quickly the development team responds to reported issues. It also serves as a reference for understanding specific weakness classes, such as improper input validation or insecure direct object references, as they manifest in form handling contexts. Additionally, users can look up the complete vulnerability history of Forminator Forms to evaluate the reliability of the plugin for their projects. This structured approach to vulnerability data enables informed decision-making regarding updates, patches, and alternative solutions, ensuring that stakeholders remain aware of potential threats and the effectiveness of past mitigation efforts without relying on isolated or outdated reports.
Vendor: wpmudev
All 24 known CVE vulnerabilities affecting Forminator Forms – Contact Form, Payment Form & Custom Form Builder with full Chinese analysis, references, and POCs where available.