CVE-2026-5229

Form Notify · Form Notify Plugin for WordPress

The Form Notify plugin for WordPress suffers from an authentication bypass vulnerability due to improper verification of user-controlled cookie data during LINE OAuth login.

Executive summary

An authentication bypass vulnerability in the Form Notify plugin for WordPress allows unauthenticated attackers to hijack any user account, including administrator accounts.

Vulnerability

This vulnerability occurs because the plugin trusts user-supplied cookie data to determine account identity during LINE OAuth flows. Unauthenticated attackers can manipulate the 'form_notify_line_email' cookie to impersonate any legitimate user.

Business impact

The ability for an unauthenticated attacker to gain administrative access poses a critical risk to data integrity, confidentiality, and system availability. With a CVSS score of 9.8, this flaw represents a total compromise of the WordPress environment, potentially leading to unauthorized data exfiltration and complete site takeover.

Remediation

Immediate Action: Update the Form Notify plugin to the latest available version provided by the vendor.

Proactive Monitoring: Review web server access logs for anomalous authentication requests or irregular patterns associated with the LINE OAuth login flow.

Compensating Controls: Implement a Web Application Firewall (WAF) to block suspicious cookie modifications or unauthorized attempts to manipulate authentication parameters.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

Given the critical CVSS severity of 9.8 and the ease of exploitation, immediate patching is required. Administrators should verify their current version and update the Form Notify plugin immediately to prevent unauthorized administrative access.