<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5063 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5063/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 03 May 2026 06:15:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5063/feed.xml" rel="self" type="application/rss+xml"/><item><title>NEX-Forms WordPress Plugin Vulnerable to Stored Cross-Site Scripting (CVE-2026-5063)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-nex-forms-xss/</link><pubDate>Sun, 03 May 2026 06:15:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-nex-forms-xss/</guid><description>The NEX-Forms WordPress plugin is vulnerable to stored XSS via POST parameter key names, allowing unauthenticated attackers to inject arbitrary web scripts.</description><content:encoded><![CDATA[<p>The NEX-Forms – Ultimate Forms Plugin for WordPress, versions up to and including 9.1.11, is susceptible to a stored Cross-Site Scripting (XSS) vulnerability (CVE-2026-5063). This flaw stems from inadequate input sanitization and output escaping within the <code>submit_nex_form()</code> function. Unauthenticated attackers can exploit this vulnerability by injecting malicious JavaScript code through POST parameter key names. Successful exploitation allows the attacker to execute arbitrary scripts in the context of a user&rsquo;s browser when they access a page containing the injected script, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability was reported to Wordfence and a patch has been released.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious HTTP POST request to a WordPress page that utilizes the vulnerable NEX-Forms plugin.</li>
<li>The POST request includes specially crafted parameter key names designed to inject JavaScript code.</li>
<li>The <code>submit_nex_form()</code> function processes the POST request without properly sanitizing or escaping the malicious input.</li>
<li>The injected JavaScript code is stored in the WordPress database.</li>
<li>A legitimate user accesses a page where the form data, including the malicious script, is displayed.</li>
<li>The stored JavaScript code executes within the user&rsquo;s browser in the context of the WordPress page.</li>
<li>The attacker can then perform actions such as stealing cookies, redirecting the user, or modifying the page content.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability allows an unauthenticated attacker to inject arbitrary JavaScript code into pages using the NEX-Forms plugin. This can lead to various malicious outcomes, including user session hijacking, website defacement, or redirection to phishing sites. As the vulnerability is stored, every user who visits a page containing the malicious script will be affected until the vulnerability is patched and the malicious input is removed. The severity is rated as HIGH with a CVSS base score of 7.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the NEX-Forms – Ultimate Forms Plugin for WordPress to a version beyond 9.1.11 to patch CVE-2026-5063.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious NEX-Forms POST Requests</code> to identify potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious POST requests containing potentially malicious JavaScript code in parameter names.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>stored-xss</category><category>cve-2026-5063</category></item></channel></rss>