{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T14:58:32.214","vulnerabilities":[{"cve":{"id":"CVE-2026-2268","sourceIdentifier":"security@wordfence.com","published":"2026-02-10T10:16:00.057","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Ninja Forms plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.14.0. This is due to the unsafe application of the `ninja_forms_merge_tags` filter to user-supplied input within repeater fields, which allows the resolution of `{post_meta:KEY}` merge tags without authorization checks. This makes it possible for unauthenticated attackers to extract arbitrary post metadata from any post on the site, including sensitive data such as WooCommerce billing emails, API keys, private tokens, and customer personal information via the `nf_ajax_submit` AJAX action."},{"lang":"es","value":"El plugin Ninja Forms para WordPress es vulnerable a la exposición de información sensible en todas las versiones hasta la 3.14.0, inclusive. Esto se debe a la aplicación insegura del filtro 'ninja_forms_merge_tags' a la entrada proporcionada por el usuario dentro de los campos repetidores, lo que permite la resolución de las etiquetas de combinación '{post_meta:KEY}' sin comprobaciones de autorización. Esto hace posible que atacantes no autenticados extraigan metadatos de publicaciones arbitrarios de cualquier publicación en el sitio, incluyendo datos sensibles como correos electrónicos de facturación de WooCommerce, claves API, tokens privados e información personal del cliente a través de la acción AJAX 'nf_ajax_submit'."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/ninja-forms/tags/3.13.3/includes/AJAX/Controllers/Submission.php#L222","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/ninja-forms/tags/3.13.3/includes/AJAX/Controllers/Submission.php#L706","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/ninja-forms/tags/3.13.3/includes/MergeTags/WP.php#L48","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/changeset/3454719/ninja-forms/trunk/includes/AJAX/Controllers/Submission.php","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/24902fab-44ea-44c9-bcf5-70960cfeb402?source=cve","source":"security@wordfence.com"}]}}]}