PT-2026-36576 · Gravity Forms · Gravity Forms

Tadokun

·

Published

2026-05-02

·

Updated

2026-05-02

·

CVE-2026-5112

CVSS v3.1

7.2

High

VectorAV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
The Gravity Forms plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in versions up to and including 2.10.0. This is due to insufficient input validation and output escaping of Calculation Product field product names when rendered inside Repeater fields. The validate() method in the GF Field Calculation class only validates the quantity field (.3) and completely ignores the product name field (.1), allowing malicious HTML to pass through validation. When the value is saved, the sanitize entry value() method returns the raw value without sanitization for fields where HTML is not expected. Subsequently, when an entry is viewed in wp-admin, the get value entry detail() method concatenates the unescaped product name directly into the output string, which is then rendered by the repeater's get value entry detail() method without further escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts via form submissions that will execute whenever an authenticated administrator with the gravityforms view entries capability accesses the entry detail page.

Fix

XSS

Weakness Enumeration

Related Identifiers

CVE-2026-5112

Affected Products

Gravity Forms