<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Divi Form Builder &lt;= 5.1.2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/divi-form-builder--5.1.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 11:02:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/divi-form-builder--5.1.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>Divi Form Builder Unauthenticated Privilege Escalation via CVE-2026-5118</title><link>https://feed.craftedsignal.io/briefs/2026-05-divi-form-builder-privesc/</link><pubDate>Thu, 21 May 2026 11:02:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-divi-form-builder-privesc/</guid><description>CVE-2026-5118 is a critical vulnerability in the Divi Form Builder WordPress plugin (versions 5.1.2 and earlier) that allows unauthenticated attackers to create administrator accounts directly through the registration form, leading to full site takeover.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-5118, has been identified in the Divi Form Builder WordPress plugin, affecting versions 5.1.2 and earlier. This flaw allows unauthenticated attackers to escalate privileges and create administrator accounts via a registration form. The vulnerability stems from insufficient validation of the &lsquo;role&rsquo; parameter in the FormSubmissionHandler.php script during user registration.  A publicly available exploit on Sploitus increases the urgency for patching affected systems. Exploitation leads to full site takeover, data breaches (if WooCommerce is installed), remote code execution via plugin/theme modification, persistent access via backdoors, and privacy violations due to access to all user data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Target Discovery:</strong> The attacker identifies websites using vulnerable versions of the Divi Form Builder plugin by scanning for registration endpoints, crawling homepage links, parsing XML sitemaps, probing the DFB REST API, and analyzing contact pages.</li>
<li><strong>Form Parameter Extraction:</strong> The attacker extracts required form parameters, including <code>fb_nonce</code>, <code>form_key</code>, <code>form_type</code> (register), <code>divi-form-submit</code>, and the injectable <code>role</code> parameter.</li>
<li><strong>Role Injection:</strong> The attacker crafts a malicious HTTP POST request to <code>/wp-admin/admin-ajax.php</code>, setting the <code>action</code> parameter to <code>de_fb_ajax_submit_ajax_handler</code> and injecting <code>administrator</code> into the <code>role</code> parameter along with other required fields.</li>
<li><strong>Account Creation:</strong> The vulnerable <code>create_user()</code> function in <code>FormSubmissionHandler.php</code> creates a new user account with the injected <code>administrator</code> role without proper validation.</li>
<li><strong>Privilege Escalation:</strong> The newly created user account is assigned the <code>administrator</code> role, granting full control over the WordPress website.</li>
<li><strong>Verification:</strong> The attacker verifies the successful privilege escalation by logging in to <code>/wp-login.php</code> with the created account credentials and accessing the <code>/wp-admin/</code> dashboard.</li>
<li><strong>Full Site Takeover:</strong> The attacker gains complete control over the WordPress site, including the ability to create/delete any user, install/activate/edit plugins (including PHP), edit theme template files, and modify site settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5118 allows an unauthenticated attacker to gain full administrative control over a WordPress website. This can lead to complete site defacement, data theft (including customer data from WooCommerce), installation of malicious plugins or themes for further attacks, and persistent access through backdoors. The number of affected sites is potentially large due to the widespread use of the Divi Form Builder plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update to Divi Form Builder version 5.1.3 or later to patch CVE-2026-5118, as mentioned in the timeline.</li>
<li>Deploy the Sigma rule <code>Detect Divi Form Builder Admin Account Creation</code> to monitor for successful exploitation attempts.</li>
<li>Monitor <code>wp_users</code> table for new administrator accounts created through suspicious activity, as suggested in the mitigation section.</li>
<li>Apply a WAF rule to block requests with the <code>role=administrator</code> parameter in POST requests, as also noted in the mitigation advice.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>wordpress</category><category>privilege escalation</category><category>cloud</category></item></channel></rss>