<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Forminator Forms – Contact Form, Payment Form &amp; Custom Form Builder Plugin — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/forminator-forms--contact-form-payment-form--custom-form-builder-plugin/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 07:16:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/forminator-forms--contact-form-payment-form--custom-form-builder-plugin/feed.xml" rel="self" type="application/rss+xml"/><item><title>Forminator Forms Plugin Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-forminator-path-traversal/</link><pubDate>Tue, 05 May 2026 07:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-forminator-path-traversal/</guid><description>The Forminator Forms WordPress plugin is vulnerable to an unauthenticated path traversal that allows reading arbitrary files on the server when specific features are enabled.</description><content:encoded><![CDATA[<p>The Forminator Forms plugin for WordPress, a widely used plugin for creating contact forms and payment forms, contains a path traversal vulnerability (CVE-2026-5192) affecting versions up to and including 1.52.1. This flaw enables unauthenticated attackers to potentially read sensitive files from the underlying server. Successful exploitation hinges on a confluence of factors: the existence of a publicly accessible form incorporating a File Upload field, the activation of &ldquo;Save and Continue&rdquo; functionality within the form&rsquo;s behavior settings, and the configuration of email notifications to include uploaded files as attachments. This vulnerability poses a significant risk, as exposed files could contain configuration details, database credentials, or other sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version of the Forminator plugin (&lt;= 1.52.1).</li>
<li>The attacker discovers or locates a publicly accessible form with a File Upload field.</li>
<li>The form has &ldquo;Save and Continue&rdquo; enabled within its Behavior settings.</li>
<li>The &ldquo;Save and Continue&rdquo; email notification is configured to attach uploaded files in Email Notifications.</li>
<li>The attacker crafts a malicious request to the &lsquo;upload-1[file][file_path]&rsquo; parameter with a path traversal payload (e.g., &lsquo;../../../../wp-config.php&rsquo;).</li>
<li>The server processes the request and attempts to access the file specified in the manipulated path.</li>
<li>Due to insufficient input validation, the server reads the arbitrary file.</li>
<li>The attacker retrieves the file content from the server&rsquo;s response or via the attached file in the email notification. This allows the attacker to access sensitive data such as wp-config.php.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability could allow attackers to read arbitrary files on the WordPress server. This could expose sensitive information, such as database credentials stored in <code>wp-config.php</code>, potentially leading to full compromise of the WordPress site and the underlying server. The number of affected sites is potentially very high given the popularity of the Forminator plugin. This can lead to data breaches, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Forminator Forms plugin to the latest version to patch CVE-2026-5192.</li>
<li>Inspect publicly accessible forms for File Upload fields and disable &ldquo;Save and Continue&rdquo; functionality or email attachment of uploaded files as a temporary mitigation.</li>
<li>Deploy the Sigma rule <code>Detect Forminator Path Traversal Attempt</code> to your SIEM to identify exploitation attempts.</li>
<li>Monitor web server logs for requests containing path traversal sequences (e.g., <code>../</code>) in the <code>upload-1[file][file_path]</code> parameter.</li>
<li>Implement strict input validation and sanitization on file paths to prevent path traversal vulnerabilities in other web applications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>wordpress</category><category>plugin</category></item></channel></rss>