WordPress Form Notify Plugin: Critical Authentication Bypass (CVE-2026-5229)
A critical authentication bypass vulnerability, identified as CVE-2026-5229, has been reported in the Form Notify plugin for WordPress, affecting versions up to and including 1.1.10. According to the National Vulnerability Database, this flaw stems from the plugin’s reliance on user-controlled cookie data for authentication after a LINE OAuth login. Specifically, when LINE fails to provide an email address — a common occurrence — the plugin insecurely defaults to reading the form_notify_line_email cookie value without verifying its association with the LINE account.
This design flaw creates a dangerous avenue for unauthenticated attackers. They can exploit it by initiating a LINE OAuth flow with their own account while simultaneously injecting a malicious cookie containing a target victim’s email address. The National Vulnerability Database rates this vulnerability with a CVSS score of 9.8 (CRITICAL), highlighting the severe risk. Successful exploitation grants attackers unauthorized access to any user account on the affected WordPress site, including those with administrator privileges.
For defenders, this is a clear and present danger. The attacker’s calculus is straightforward: leverage a common OAuth fallback mechanism to achieve full account takeover with minimal effort. This isn’t theoretical; it’s a direct path to compromise for any WordPress site running the vulnerable Form Notify plugin. The implications for data integrity, confidentiality, and overall site security are profound, making immediate action imperative.
What This Means For You
- If your organization uses the Form Notify plugin for WordPress, you must immediately check your installed version. Any version up to and including 1.1.10 is vulnerable to CVE-2026-5229. Patch or disable this plugin without delay to prevent unauthenticated attackers from gaining administrator access to your site. Audit logs for suspicious LINE OAuth logins if you've been running a vulnerable version.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
WordPress Form Notify Plugin Authentication Bypass via LINE OAuth Cookie - CVE-2026-5229
title: WordPress Form Notify Plugin Authentication Bypass via LINE OAuth Cookie - CVE-2026-5229
id: scw-2026-05-15-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-5229 by observing web server requests that attempt to leverage the LINE OAuth flow for authentication bypass. Specifically, this rule looks for POST requests to wp-login.php that originate from a LINE domain and contain the 'form_notify_line_email' parameter in the query string, indicating a potential attempt to inject a malicious cookie to impersonate a user.
author: SCW Feed Engine (AI-generated)
date: 2026-05-15
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-5229/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/wp-login.php'
cs-method:
- 'POST'
referer|contains:
- 'line.me'
cs-uri-query|contains:
- 'form_notify_line_email='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-5229 | Auth Bypass | Form Notify plugin for WordPress versions <= 1.1.10 |
| CVE-2026-5229 | Auth Bypass | Vulnerable component: LINE OAuth login process |
| CVE-2026-5229 | Auth Bypass | Vulnerable mechanism: Trusting user-controlled 'form_notify_line_email' cookie data without verification |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 15, 2026 at 12:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.