Skip to content
Threat Feed
critical advisory

WordPress Form Notify Plugin Authentication Bypass Vulnerability (CVE-2026-5229)

The Form Notify plugin for WordPress is vulnerable to CVE-2026-5229, an authentication bypass, due to trusting user-controlled cookie data after a LINE OAuth login, allowing unauthenticated attackers to gain administrative access.

The Form Notify plugin for WordPress is vulnerable to an authentication bypass vulnerability, identified as CVE-2026-5229, in versions up to and including 1.1.10. The vulnerability stems from the plugin’s flawed logic in handling LINE OAuth logins. Specifically, when LINE does not provide an email address for a user, the plugin relies on the ‘form_notify_line_email’ cookie to determine the WordPress account to authenticate. The plugin fails to validate that the LINE account is actually associated with the email address provided in the cookie, enabling attackers to forge the cookie value. This makes it possible for an unauthenticated attacker to gain access to any user account on the WordPress site, including those with administrator privileges.

Attack Chain

  1. The attacker identifies a WordPress site using a vulnerable version (<= 1.1.10) of the Form Notify plugin.
  2. The attacker registers a LINE OAuth account.
  3. The attacker initiates a LINE OAuth login flow on the target WordPress site.
  4. The LINE OAuth flow does not provide an email address (this is a common scenario).
  5. Before completing the login, the attacker injects a malicious ‘form_notify_line_email’ cookie into their browser session, setting the value to the email address of the target victim’s WordPress account (e.g., the administrator’s email).
  6. The attacker completes the LINE OAuth login process on the WordPress site.
  7. The Form Notify plugin reads the ‘form_notify_line_email’ cookie and, without proper verification, authenticates the attacker as the victim user.
  8. The attacker now has full access to the victim’s WordPress account, potentially gaining administrative control of the entire site.

Impact

Successful exploitation of CVE-2026-5229 allows unauthenticated attackers to bypass authentication and gain unauthorized access to WordPress accounts, including administrator accounts. This can lead to complete compromise of the WordPress site, including data theft, defacement, malware injection, and denial of service. The severity is high due to the ease of exploitation and the potential for widespread impact, particularly on sites relying on the Form Notify plugin for critical functionality.

Recommendation

  • Apply available patches or upgrade Form Notify plugin to a version greater than 1.1.10 to remediate CVE-2026-5229.
  • Deploy the Sigma rule Detect WordPress Form Notify Authentication Bypass via Malicious Cookie to your SIEM to detect potential exploitation attempts (see below).
  • Monitor web server logs for suspicious POST requests with manipulated form_notify_line_email cookies.

Detection coverage 2

Detect WordPress Form Notify Authentication Bypass via Malicious Cookie

critical

Detects CVE-2026-5229 exploitation — Authentication bypass in WordPress Form Notify plugin due to malicious form_notify_line_email cookie

sigma tactics: privilege_escalation techniques: T1550.002 sources: webserver

Detect Possible WordPress Form Notify Authentication Bypass - LINE OAuth

medium

Detects potential CVE-2026-5229 exploitation attempts by monitoring for LINE OAuth login requests without an associated email.

sigma tactics: privilege_escalation techniques: T1550.002 sources: webserver

Detection queries are available on the platform. Get full rules →