[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fdgTMLjyAJ44giv4M8mhoSesmNPvj9I_EbIJ9pW1E84Y":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-8b0e0f22-de42-4da9-a0c1-ae41ba57be03-sureforms","sureforms-drag-and-drop-form-builder-for-wordpress-unauthenticated-stripe-payment-amount-manipulation","SureForms – Drag and Drop Form Builder for WordPress \u003C= 2.2.1 - Unauthenticated Stripe Payment Amount Manipulation","The SureForms – Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Improper Input Validation in all versions up to, and including, 2.2.1. This is due to the plugin accepting the payment amount directly from user-controlled POST data in the 'create_payment_intent' and 'create_subscription_intent' functions without validating it against the form's configured price. This makes it possible for unauthenticated attackers to modify the payment amount to any arbitrary value when submitting a Stripe payment form, potentially purchasing products or services at significantly reduced prices.","sureforms",null,"\u003C=2.2.1","2.2.2","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:H\u002FA:N","Improper Input Validation","2026-02-13 18:17:21","2026-02-13 18:17:23",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F8b0e0f22-de42-4da9-a0c1-ae41ba57be03?source=api-prod",0]