Cyber Posture

CVE-2026-5192

High

Published: 05 May 2026

Published
05 May 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0004 12.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 1.52.1 via the 'upload-1[file][file_path]' parameter. This makes it possible for unauthenticated attackers to read…

more

the contents of arbitrary files on the server, which can contain sensitive information. Successful exploitation requires a publicly accessible form with a File Upload field where Save and Continue is enabled in that form's Behavior settings and the Save and Continue email notification is configured to attach uploaded files in Email Notifications.

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-22

Validates pathnames and filenames to prevent traversal outside intended directories.

Security SummaryAI

CVE-2026-5192 is a Path Traversal vulnerability (CWE-22) affecting the Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress in versions up to and including 1.52.1. The flaw occurs via the 'upload-1[file][file_path]' parameter, enabling unauthenticated attackers to read the contents of arbitrary files on the server, which may contain sensitive information. Published on 2026-05-05, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with low attack complexity.

Unauthenticated attackers can exploit this vulnerability on sites running vulnerable plugin versions where a publicly accessible form includes a File Upload field with "Save and Continue" enabled in the form's Behavior settings, and the "Save and Continue" email notification is configured to attach uploaded files. Exploitation allows remote reading of arbitrary server files, potentially exposing sensitive data such as configuration files or other non-public information.

Advisories point to mitigation via plugin updates, with a patch committed in WordPress plugin trac changeset 3500671 at https://plugins.trac.wordpress.org/changeset/3500671/forminator. Further details on the vulnerability and remediation are provided in the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/788422c4-e070-48aa-a85d-a5d5a25a6a1d?source=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Path traversal in public-facing WordPress plugin directly enables remote unauthenticated file read (T1005 Data from Local System) via exploitation of an Internet-facing application (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References