The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerable to Insufficient Verification of Data Authenticity in all versions up to, and including, 6.1.17. This is due to the PayPal IPN (Instant Payment Notification) verification being disabled by default (`disable_ipn_verification` defaults to `'yes'` in `PayPalSettings.php`). This makes it possible for unauthenticated attackers to send forged PayPal IPN notifications to the publicly accessible IPN endpoint, marking unpaid form submissions as "paid" and triggering post-payment automation (emails, access grants, digital product delivery).
Metrics
Affected Vendors & Products
References
History
Fri, 27 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Techjewel
Techjewel fluent Forms Pro Add On Pack Wordpress Wordpress wordpress |
|
| Vendors & Products |
Techjewel
Techjewel fluent Forms Pro Add On Pack Wordpress Wordpress wordpress |
|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerable to Insufficient Verification of Data Authenticity in all versions up to, and including, 6.1.17. This is due to the PayPal IPN (Instant Payment Notification) verification being disabled by default (`disable_ipn_verification` defaults to `'yes'` in `PayPalSettings.php`). This makes it possible for unauthenticated attackers to send forged PayPal IPN notifications to the publicly accessible IPN endpoint, marking unpaid form submissions as "paid" and triggering post-payment automation (emails, access grants, digital product delivery). | |
| Title | Fluent Forms Pro Add On Pack <= 6.1.17 - Missing Authorization to Unauthenticated Payment Status modification | |
| Weaknesses | CWE-345 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2026-02-27T03:23:19.329Z
Updated: 2026-02-27T15:49:59.392Z
Reserved: 2026-02-12T20:48:34.727Z
Link: CVE-2026-2428
Updated: 2026-02-27T15:49:47.664Z
Status : Awaiting Analysis
Published: 2026-02-27T04:16:03.600
Modified: 2026-02-27T14:06:37.987
Link: CVE-2026-2428
No data.