The Forminator plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.52.0. This is due to the plugin not properly verifying that a user is authorized to perform an action when processing attacker-supplied Stripe PaymentIntent identifiers in the public payment flow. This makes it possible for unauthenticated attackers to submit high-value paid forms as completed by reusing a previously succeeded low-value Stripe PaymentIntent, resulting in underpayment/payment bypass conditions.
Metrics
Affected Vendors & Products
References
History
Tue, 05 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wpmudev Wpmudev forminator Forms – Contact Form, Payment Form & Custom Form Builder |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wpmudev Wpmudev forminator Forms – Contact Form, Payment Form & Custom Form Builder |
Tue, 05 May 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Forminator plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.52.0. This is due to the plugin not properly verifying that a user is authorized to perform an action when processing attacker-supplied Stripe PaymentIntent identifiers in the public payment flow. This makes it possible for unauthenticated attackers to submit high-value paid forms as completed by reusing a previously succeeded low-value Stripe PaymentIntent, resulting in underpayment/payment bypass conditions. | |
| Title | Forminator – Contact Form, Payment Form & Custom Form Builder <= 1.52.0 - Missing Authorization to Unauthenticated Stripe PaymentIntent Reuse / Underpayment Bypass via 'paymentid' Parameter | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-05T06:43:30.131Z
Reserved: 2026-02-19T02:39:56.765Z
Link: CVE-2026-2729
Updated: 2026-05-05T13:48:37.220Z
Status : Received
Published: 2026-05-05T07:15:59.960
Modified: 2026-05-05T07:15:59.960
Link: CVE-2026-2729
No data.
OpenCVE Enrichment
Updated: 2026-05-05T09:15:20Z