CVE-2026-5113: Gravity Forms XSS via Flawed Consent Field Validation
The National Vulnerability Database reports CVE-2026-5113, a high-severity (CVSS 7.2) Stored Cross-Site Scripting (XSS) vulnerability in the Gravity Forms plugin for WordPress, affecting versions up to and including 2.10.0. This flaw stems from an inadequate state validation mechanism within the Consent field’s hidden inputs, combined with insufficient output escaping. The core issue lies in how wp_kses() sanitization interacts with the validation logic: an attacker can inject XSS payloads using tags that wp_kses() strips (like <svg>), yet the flawed validation still passes because the sanitized hash matches the expected state, while the malicious raw input is preserved.
This means unauthenticated attackers can inject arbitrary web scripts into form entries. When an authenticated administrator later views the Entries List page, the stored malicious consent label is retrieved and executed without proper escaping. This isn’t just a nuisance; it’s a direct path for attackers to compromise administrator sessions, potentially leading to website defacement, data theft, or further system compromise through privilege escalation.
For defenders, this is a critical reminder that even seemingly robust sanitization functions like wp_kses() can be bypassed if the surrounding validation logic is weak. It highlights the importance of a defense-in-depth approach, where input validation, output encoding, and integrity checks are all rigorously applied and don’t rely on a single point of failure. This specific vulnerability is a prime example of how a ‘fail open’ state in validation can be weaponized.
What This Means For You
- If your organization uses Gravity Forms for WordPress, you must immediately verify your plugin version. Any installation running Gravity Forms 2.10.0 or older is vulnerable. Patching this is non-negotiable to prevent unauthenticated attackers from injecting malicious scripts that execute on your administrators' browsers.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-5113: Gravity Forms Stored XSS via Consent Field
title: CVE-2026-5113: Gravity Forms Stored XSS via Consent Field
id: scw-2026-05-02-ai-1
status: experimental
level: high
description: |
Detects potential exploitation of CVE-2026-5113 by identifying requests to the Gravity Forms entries page that contain a consent field type and an SVG tag, indicative of a stored XSS payload being submitted. This rule targets the specific vulnerability where unsanitized SVG tags in consent labels are rendered without escaping on the entries list page, leading to XSS execution when an administrator views the entries.
author: SCW Feed Engine (AI-generated)
date: 2026-05-02
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-5113/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
uri|contains:
- '/wp-admin/admin.php?page=gf_entries'
cs-uri-query|contains:
- 'gf_field_type=consent'
cs-uri-query|contains:
- '<svg'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-5113 | XSS | Gravity Forms plugin for WordPress |
| CVE-2026-5113 | XSS | Gravity Forms plugin versions up to and including 2.10.0 |
| CVE-2026-5113 | XSS | Vulnerable component: Consent field hidden inputs |
| CVE-2026-5113 | XSS | Attack vector: Injecting XSS payloads using tags stripped by wp_kses() (e.g., |
| CVE-2026-5113 | XSS | Trigger: Authenticated administrator accessing the Entries List page |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 02, 2026 at 09:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.