The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerable to Insufficient Verification of Data Authenticity in all versions up to, and including, 6.1.17. This is due to the PayPal IPN (Instant Payment Notification) verification being disabled by default (`disable_ipn_verification` defaults to `'yes'` in `PayPalSettings.php`). This makes it possible for unauthenticated attackers to send forged PayPal IPN notifications to the publicly accessible IPN endpoint, marking unpaid form submissions as "paid" and triggering post-payment automation (emails, access grants, digital product delivery).
History

Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Techjewel
Techjewel fluent Forms Pro Add On Pack
Wordpress
Wordpress wordpress
Vendors & Products Techjewel
Techjewel fluent Forms Pro Add On Pack
Wordpress
Wordpress wordpress
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Description The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerable to Insufficient Verification of Data Authenticity in all versions up to, and including, 6.1.17. This is due to the PayPal IPN (Instant Payment Notification) verification being disabled by default (`disable_ipn_verification` defaults to `'yes'` in `PayPalSettings.php`). This makes it possible for unauthenticated attackers to send forged PayPal IPN notifications to the publicly accessible IPN endpoint, marking unpaid form submissions as "paid" and triggering post-payment automation (emails, access grants, digital product delivery).
Title Fluent Forms Pro Add On Pack <= 6.1.17 - Missing Authorization to Unauthenticated Payment Status modification
Weaknesses CWE-345
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2026-02-27T03:23:19.329Z

Updated: 2026-02-27T15:49:59.392Z

Reserved: 2026-02-12T20:48:34.727Z

Link: CVE-2026-2428

cve-icon Vulnrichment

Updated: 2026-02-27T15:49:47.664Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-27T04:16:03.600

Modified: 2026-02-27T14:06:37.987

Link: CVE-2026-2428

cve-icon Redhat

No data.