FKIE_CVE-2026-2268
Vulnerability from fkie_nvd - Published: 2026-02-10 10:16 - Updated: 2026-04-15 00:35
Severity ?
Summary
The Ninja Forms plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.14.0. This is due to the unsafe application of the `ninja_forms_merge_tags` filter to user-supplied input within repeater fields, which allows the resolution of `{post_meta:KEY}` merge tags without authorization checks. This makes it possible for unauthenticated attackers to extract arbitrary post metadata from any post on the site, including sensitive data such as WooCommerce billing emails, API keys, private tokens, and customer personal information via the `nf_ajax_submit` AJAX action.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ninja Forms plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.14.0. This is due to the unsafe application of the `ninja_forms_merge_tags` filter to user-supplied input within repeater fields, which allows the resolution of `{post_meta:KEY}` merge tags without authorization checks. This makes it possible for unauthenticated attackers to extract arbitrary post metadata from any post on the site, including sensitive data such as WooCommerce billing emails, API keys, private tokens, and customer personal information via the `nf_ajax_submit` AJAX action."
},
{
"lang": "es",
"value": "El plugin Ninja Forms para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n sensible en todas las versiones hasta la 3.14.0, inclusive. Esto se debe a la aplicaci\u00f3n insegura del filtro \u0027ninja_forms_merge_tags\u0027 a la entrada proporcionada por el usuario dentro de los campos repetidores, lo que permite la resoluci\u00f3n de las etiquetas de combinaci\u00f3n \u0027{post_meta:KEY}\u0027 sin comprobaciones de autorizaci\u00f3n. Esto hace posible que atacantes no autenticados extraigan metadatos de publicaciones arbitrarios de cualquier publicaci\u00f3n en el sitio, incluyendo datos sensibles como correos electr\u00f3nicos de facturaci\u00f3n de WooCommerce, claves API, tokens privados e informaci\u00f3n personal del cliente a trav\u00e9s de la acci\u00f3n AJAX \u0027nf_ajax_submit\u0027."
}
],
"id": "CVE-2026-2268",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security@wordfence.com",
"type": "Secondary"
}
]
},
"published": "2026-02-10T10:16:00.057",
"references": [
{
"source": "security@wordfence.com",
"url": "https://plugins.trac.wordpress.org/browser/ninja-forms/tags/3.13.3/includes/AJAX/Controllers/Submission.php#L222"
},
{
"source": "security@wordfence.com",
"url": "https://plugins.trac.wordpress.org/browser/ninja-forms/tags/3.13.3/includes/AJAX/Controllers/Submission.php#L706"
},
{
"source": "security@wordfence.com",
"url": "https://plugins.trac.wordpress.org/browser/ninja-forms/tags/3.13.3/includes/MergeTags/WP.php#L48"
},
{
"source": "security@wordfence.com",
"url": "https://plugins.trac.wordpress.org/changeset/3454719/ninja-forms/trunk/includes/AJAX/Controllers/Submission.php"
},
{
"source": "security@wordfence.com",
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/24902fab-44ea-44c9-bcf5-70960cfeb402?source=cve"
}
],
"sourceIdentifier": "security@wordfence.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "security@wordfence.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…