Fluent Forms WordPress Plugin IDOR Vulnerability (CVE-2026-5395)
The Fluent Forms WordPress plugin through 6.2.0 is vulnerable to Insecure Direct Object Reference (IDOR), allowing authenticated users with manager-level access or higher to bypass form-level access controls, export arbitrary database tables, and enumerate table names via error messages, as tracked by CVE-2026-5395.
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress, versions up to and including 6.2.0, contains an Insecure Direct Object Reference (IDOR) vulnerability. This flaw resides within the exportEntries function. The vulnerability stems from a lack of proper validation on a user-controlled key, enabling authenticated attackers with manager-level access or higher to circumvent form-level access restrictions. This allows them to access submissions from forms they lack authorization to view. The issue was reported on May 14, 2026, and is tracked as CVE-2026-5395. Exploitation can lead to unauthorized data access, potential data exfiltration, and information disclosure.
Attack Chain
- An attacker authenticates to the WordPress instance with manager-level or higher privileges.
- The attacker crafts a malicious HTTP request targeting the
exportEntriesfunction. - The request includes a manipulated user-controlled key to bypass form-level access restrictions.
- Due to the missing validation, the application processes the request without verifying the attacker’s authorization to the target form.
- The attacker gains unauthorized access to form submissions from forms they are not authorized to view.
- The attacker exploits the same IDOR vulnerability to export data from arbitrary database tables by manipulating the key.
- The attacker leverages error messages disclosed by the application to enumerate database table names.
- The attacker exfiltrates the sensitive data obtained from unauthorized access to form submissions and exported database tables.
Impact
Successful exploitation of CVE-2026-5395 allows attackers to bypass access controls and gain unauthorized access to sensitive form submission data. This can lead to the exposure of personal information, business intelligence, or other confidential data collected through the forms. The ability to export arbitrary database tables further expands the scope of the attack, potentially compromising the entire WordPress database. The enumeration of database table names provides attackers with valuable information for further reconnaissance and exploitation attempts.
Recommendation
- Apply the latest security updates for the Fluent Forms plugin to patch CVE-2026-5395.
- Deploy the Sigma rule “Detect CVE-2026-5395 Exploitation Attempt via Fluent Forms IDOR” to monitor for suspicious requests to the
exportEntriesfunction in the webserver logs. - Review user access controls and ensure that users have only the necessary privileges to access specific forms to mitigate potential internal threats.
- Enable detailed logging for the WordPress application to capture relevant events for investigating potential exploitation attempts.
Detection coverage 2
Detect CVE-2026-5395 Exploitation Attempt via Fluent Forms IDOR
highDetects CVE-2026-5395 exploitation attempt — HTTP request to the Fluent Forms exportEntries function with suspicious parameters indicative of IDOR.
Detect Fluent Forms Database Table Enumeration via Error Messages
mediumDetects Fluent Forms database table enumeration via error messages containing database table names.
Detection queries are available on the platform. Get full rules →