CVE-2026-32525

JetMonsters · JetFormBuilder

JetFormBuilder is vulnerable to Code Injection due to improper control of code generation. This affects versions up to and including 3.5.6.1.

Executive summary

A critical code injection vulnerability in the JetFormBuilder WordPress plugin allows unauthenticated attackers to execute arbitrary code on the server, leading to a complete site takeover.

Vulnerability

The vulnerability is a Code Injection flaw within the jetformbuilder component. The plugin fails to properly sanitize inputs that are later used in the generation of executable code, allowing an unauthenticated attacker to inject and run malicious PHP scripts.

Business impact

Successful exploitation allows for Remote Code Execution (RCE), giving the attacker the same permissions as the web server. This can lead to the theft of sensitive customer data, deployment of malware, and total loss of site availability. The CVSS score of 9.9 indicates an extreme risk level.

Remediation

Immediate Action: Update JetFormBuilder to version 3.5.7 or higher immediately to patch the code injection entry points.

Proactive Monitoring: Review web logs for unusual POST requests to form-processing endpoints that contain PHP code fragments or obfuscated strings.

Compensating Controls: Implement strict file integrity monitoring (FIM) to detect any unauthorized changes to the WordPress core or plugin files.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Given the CVSS score of 9.9, this vulnerability is critical. We recommend an immediate update of the JetFormBuilder plugin. Administrators should also review their WordPress security posture to ensure that unauthenticated code execution is mitigated by layered defenses.