Cyber Posture

CVE-2026-5063

High

Published: 03 May 2026

Published
03 May 2026
Modified
03 May 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0003 7.7th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2026-5063 is a stored cross-site scripting (XSS) vulnerability, classified under CWE-79, in the NEX-Forms – Ultimate Forms Plugin for WordPress. It affects versions up to and including 9.1.11, stemming from insufficient input sanitization and output escaping of POST parameter key names in the submit_nex_form() function. This flaw enables the injection of arbitrary web scripts into pages. The vulnerability carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N), indicating high severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and changed scope.

Unauthenticated attackers can exploit this vulnerability remotely by submitting forms with malicious POST parameter key names containing scripts. Once injected, the scripts persist in stored form data and execute in users' browsers whenever they access the affected pages, potentially compromising visitor sessions, stealing sensitive data, or enabling further attacks like account takeovers.

Mitigation details are available in the WordPress plugin trac changeset 3513524 at https://plugins.trac.wordpress.org/changeset/3513524/nex-forms-express-wp-form-builder, which addresses the issue. Wordfence provides additional threat intelligence, including exploitation details, at https://www.wordfence.com/threat-intel/vulnerabilities/id/9bac82ee-55bf-4381-b441-115a675e4834?source=cve. Security practitioners should update to a patched version beyond 9.1.11 and sanitize form inputs as a defense-in-depth measure.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Stored XSS in public-facing WordPress plugin enables remote exploitation of the application (T1190) and execution of injected JavaScript in victim browsers (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References