CVE-2026-3492 PUBLISHED

Gravity Forms <= 2.9.28.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting via Form Title

Assigner: Wordfence
Reserved: 03.03.2026 Published: 11.03.2026 Updated: 11.03.2026

The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.9.28.1. This is due to a compound failure involving missing authorization on the create_from_template AJAX endpoint (allowing any authenticated user to create forms), insufficient input sanitization (sanitize_text_field() preserves single quotes), and missing output escaping when the form title is rendered in the Form Switcher dropdown (title attribute constructed without esc_attr(), and JavaScript saferHtml utility only escapes &, <, > but not quotes). This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary JavaScript that executes when an Administrator searches in the Form Switcher dropdown in the Form Editor.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
CVSS Score: 6.4

Product Status

Vendor Gravity Forms
Product Gravity Forms
Versions Default: unaffected
  • affected from * to 2.9.28 (incl.)

Credits

  • Phú finder

References

Problem Types

  • CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE