<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gravity Forms Plugin — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/gravity-forms-plugin/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/gravity-forms-plugin/feed.xml" rel="self" type="application/rss+xml"/><item><title>Gravity Forms Plugin Unauthenticated Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-gravityforms-xss/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gravityforms-xss/</guid><description>The Gravity Forms plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.10.0, allowing unauthenticated attackers to inject arbitrary web scripts via form submissions that execute when an administrator views the entry detail page.</description><content:encoded><![CDATA[<p>The Gravity Forms plugin for WordPress, a widely used form management tool, contains a vulnerability that can be exploited by unauthenticated attackers. Specifically, versions up to and including 2.10.0 are susceptible to Stored Cross-Site Scripting (XSS) due to insufficient input validation and output escaping of Calculation Product field names within Repeater fields. This flaw resides in how the plugin processes and renders form submissions containing malicious HTML within the product name field. The vulnerability allows an attacker to inject arbitrary web scripts that execute in the context of an authenticated administrator&rsquo;s session when they access the entry detail page within the WordPress admin panel. Successful exploitation enables attackers to perform actions with the privileges of the compromised administrator.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious form submission.</li>
<li>The malicious payload is placed in the Calculation Product field&rsquo;s product name (.1) within a Repeater field.</li>
<li>The <code>validate()</code> method in the <code>GF_Field_Calculation</code> class inadequately validates the product name field, failing to sanitize malicious HTML.</li>
<li>The <code>sanitize_entry_value()</code> method returns the raw, unsanitized value for the product name field, as HTML sanitization is not expected for this field.</li>
<li>The malicious form submission is saved as an entry in WordPress.</li>
<li>An authenticated administrator with the <code>gravityforms_view_entries</code> capability accesses the entry detail page in <code>wp-admin</code>.</li>
<li>The <code>get_value_entry_detail()</code> method concatenates the unsanitized product name directly into the output string.</li>
<li>The repeater&rsquo;s <code>get_value_entry_detail()</code> method renders the unsanitized output, leading to the execution of the injected XSS payload within the administrator&rsquo;s browser.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an unauthenticated attacker to execute arbitrary JavaScript code within the context of an authenticated WordPress administrator&rsquo;s session. This can lead to account takeover, data theft, or further malicious actions performed on the WordPress site. While the number of potentially affected sites is large due to the plugin&rsquo;s popularity, the impact is limited to administrators who access the specific entry containing the malicious payload.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gravity Forms plugin to a version greater than 2.10.0 to patch CVE-2026-5112.</li>
<li>Implement the Sigma rule <code>Detect Gravity Forms XSS via Product Name</code> to detect attempts to inject malicious scripts into product names.</li>
<li>Review and audit existing Gravity Forms entries for suspicious content in Calculation Product fields to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>wordpress</category><category>gravityforms</category></item></channel></rss>