CVE-2026-5192
Published: 05 May 2026
Description
The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 1.52.1 via the 'upload-1[file][file_path]' parameter. This makes it possible for unauthenticated attackers to read…
more
the contents of arbitrary files on the server, which can contain sensitive information. Successful exploitation requires a publicly accessible form with a File Upload field where Save and Continue is enabled in that form's Behavior settings and the Save and Continue email notification is configured to attach uploaded files in Email Notifications.
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Validates pathnames and filenames to prevent traversal outside intended directories.
Security SummaryAI
CVE-2026-5192 is a Path Traversal vulnerability (CWE-22) affecting the Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress in versions up to and including 1.52.1. The flaw occurs via the 'upload-1[file][file_path]' parameter, enabling unauthenticated attackers to read the contents of arbitrary files on the server, which may contain sensitive information. Published on 2026-05-05, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with low attack complexity.
Unauthenticated attackers can exploit this vulnerability on sites running vulnerable plugin versions where a publicly accessible form includes a File Upload field with "Save and Continue" enabled in the form's Behavior settings, and the "Save and Continue" email notification is configured to attach uploaded files. Exploitation allows remote reading of arbitrary server files, potentially exposing sensitive data such as configuration files or other non-public information.
Advisories point to mitigation via plugin updates, with a patch committed in WordPress plugin trac changeset 3500671 at https://plugins.trac.wordpress.org/changeset/3500671/forminator. Further details on the vulnerability and remediation are provided in the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/788422c4-e070-48aa-a85d-a5d5a25a6a1d?source=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing WordPress plugin directly enables remote unauthenticated file read (T1005 Data from Local System) via exploitation of an Internet-facing application (T1190).