CVE-2026-5112
Published: 02 May 2026
Summary
CVE-2026-5112 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Gravityforms (inferred from references). Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces validation of Calculation Product field product names to block malicious HTML from bypassing the validate() method and being stored unsanitized.
Requires output filtering and escaping in get_value_entry_detail() methods to prevent execution of stored scripts when administrators view entry details.
Mandates timely patching of the Gravity Forms plugin flaw as detailed in advisories to remediate the input validation and output escaping deficiencies.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The stored XSS allows unauthenticated attackers to submit malicious payloads to the public-facing form (T1190 Exploit Public-Facing Application), which stores and executes arbitrary JavaScript in the admin browser context upon viewing entries (T1059.007 JavaScript).
NVD Description
The Gravity Forms plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in versions up to and including 2.10.0. This is due to insufficient input validation and output escaping of Calculation Product field product names when rendered inside Repeater…
more
fields. The validate() method in the GF_Field_Calculation class only validates the quantity field (.3) and completely ignores the product name field (.1), allowing malicious HTML to pass through validation. When the value is saved, the sanitize_entry_value() method returns the raw value without sanitization for fields where HTML is not expected. Subsequently, when an entry is viewed in wp-admin, the get_value_entry_detail() method concatenates the unescaped product name directly into the output string, which is then rendered by the repeater's get_value_entry_detail() method without further escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts via form submissions that will execute whenever an authenticated administrator with the gravityforms_view_entries capability accesses the entry detail page.
Deeper analysisAI
CVE-2026-5112 is an unauthenticated stored Cross-Site Scripting (XSS) vulnerability, mapped to CWE-79, affecting the Gravity Forms plugin for WordPress in versions up to and including 2.10.0. The flaw arises from insufficient input validation and output escaping of Calculation Product field product names when rendered inside Repeater fields. The validate() method in the GF_Field_Calculation class only validates the quantity field (.3) and ignores the product name field (.1), permitting malicious HTML to bypass checks. When saved, the sanitize_entry_value() method returns the raw value unsanitized for fields not expecting HTML. Later, get_value_entry_detail() concatenates the unescaped product name into output, which the repeater's get_value_entry_detail() renders without further escaping.
Unauthenticated attackers can exploit this vulnerability by submitting forms with arbitrary web scripts embedded in the Calculation Product field product name. The payloads store in the database and execute whenever an authenticated administrator possessing the gravityforms_view_entries capability views the entry detail page in wp-admin. This achieves script execution in the administrator's browser context, with a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N), enabling potential account takeover or further site compromise.
Advisories and patches are detailed in the Gravity Forms changelog at https://docs.gravityforms.com/gravityforms-change-log/ and the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/63973f61-81f0-4fc8-810c-a15734ff824e?source=cve, which cover remediation steps for affected installations.
Details
- CWE(s)