REPORT / 01

Analysis Report · Folder Analysis cache/nex-forms-express-wp-form-builder_9.1.11 → cache/nex-forms-express-wp-form-builder_9.1.12 — CVE-2026-5063

Shared security patch analysis results

mode patchdiff ai claude claude-haiku-4-5-20251001
02 · Lifecycle actions cancel · resume · skip · regenerate · redo
03 · Share this analysis copy link · embed report
03 · CVE Security Analysis & Writeups ai-generated · per cve

Comprehensive security analysis generated by AI for each confirmed CVE match. Click on a CVE to view the detailed writeup including vulnerability background, technical details, patch analysis, and PoC guide.

CVE-2026-5063 NVD
AI-Generated Analysis
05 · Findings filter · search · paginate
Use quotes for exact: "SQL injection" · Operators: hello AND bye, admin OR root, -error, NOT warning
Showing 0 to 0 of 0 results
includes/classes/class.db.php AI: 1 vulnerabilities CVE-2026-5063
--- cache/nex-forms-express-wp-form-builder_9.1.11/includes/classes/class.db.php	2026-05-04 00:08:13.042206177 +0000+++ cache/nex-forms-express-wp-form-builder_9.1.12/includes/classes/class.db.php	2026-05-04 00:08:28.363307585 +0000@@ -3671,11 +3671,13 @@ 			{
 			$field_name = ((isset($data['field_name'])) ? $data['field_name'] : '');
 			$field_value = ((isset($data['field_value'])) ? $data['field_value'] : '');
+			
+			
 			if(!is_array($field_value)){
 				if(!strstr($field_value,'data:image'))
-					$set_data .= '<span class="entry_data_name">'.$nf_functions->unformat_records_name($field_name).'</span> : <span class="entry_data_value">'.$field_value.'</span> | ';
+					$set_data .= '<span class="entry_data_name">'.$nf_functions->unformat_records_name($field_name).'</span> : <span class="entry_data_value">'.esc_html($field_value).'</span> | ';
 				else
-					$set_data .= '<span class="entry_data_name">'.$nf_functions->unformat_records_name($field_name).'</span> : <span class="entry_data_value"><img src="'.$field_value.'" width="50"/></span> | '; // phpcs:ignore PluginCheck.CodeAnalysis.ImageFunctions.NonEnqueuedImage
+					$set_data .= '<span class="entry_data_name">'.$nf_functions->unformat_records_name($field_name).'</span> : <span class="entry_data_value"><img src="'.esc_html($field_value).'" width="50"/></span> | '; // phpcs:ignore PluginCheck.CodeAnalysis.ImageFunctions.NonEnqueuedImage
 				}
 			}
 		$i++;
AI Analysis
# Security Analysis: class.db.php Diff

Vulnerability Existed: yes

**Cross-Site Scripting (XSS)** [includes/classes/class.db.php] [Lines 3677-3679]

**Old Code:**
```php
$set_data .= '<span class="entry_data_name">'.$nf_functions->unformat_records_name($field_name).'</span> : <span class="entry_data_value">'.$field_value.'</span> | ';
```
and
```php
$set_data .= '<span class="entry_data_name">'.$nf_functions->unformat_records_name($field_name).'</span> : <span class="entry_data_value"><img src="'.$field_value.'" width="50"/></span> | ';
```

**Fixed Code:**
```php
$set_data .= '<span class="entry_data_name">'.$nf_functions->unformat_records_name($field_name).'</span> : <span class="entry_data_value">'.esc_html($field_value).'</span> | ';
```
and
```php
$set_data .= '<span class="entry_data_name">'.$nf_functions->unformat_records_name($field_name).'</span> : <span class="entry_data_value"><img src="'.esc_html($field_value).'" width="50"/></span> | ';
```

**Summary:** The vulnerability was a reflected/stored XSS vulnerability where `$field_value` was directly concatenated into HTML output without proper escaping. The fix applies `esc_html()` to sanitize the field value before output, preventing malicious scripts from being executed in the browser.
CVE Analysis Results:
CVE-2026-5063: Yes
View CVE Description
The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via POST parameter key names in the submit_nex_form() function in versions up to, and including, 9.1.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Showing 1 to 1 of 1 results