CVE-2026-26188

5.4 MEDIUM

📋 TL;DR

The Solspace Freeform plugin for Craft CMS 5.x contains a stored cross-site scripting (XSS) vulnerability that allows authenticated users with form creation/edit permissions to inject malicious HTML/JavaScript into the Craft Control Panel. This code executes when administrators view form builder or integration screens, potentially compromising admin sessions. The vulnerability affects all Craft CMS 5.x installations using Freeform plugin versions before 5.14.7.

💻 Affected Systems

Products:
  • Solspace Freeform plugin for Craft CMS
Versions: All versions before 5.14.7
Operating Systems: All platforms running Craft CMS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Craft CMS 5.x with Freeform plugin installed. The vulnerability is present in default configurations where users have form creation/edit permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with low-privilege access could inject malicious JavaScript that steals admin session cookies, performs actions as administrators, or installs backdoors when admins view compromised forms/integrations.

🟠

Likely Case

Attackers with authenticated access could deface the admin interface, steal session tokens, or perform limited administrative actions through XSS payloads.

🟢

If Mitigated

With proper access controls limiting who can create/edit forms, the attack surface is reduced, but any compromised low-privilege account could still exploit the vulnerability.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access with form creation/edit permissions. The vulnerability is in the frontend rendering of user-controlled data without proper sanitization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.14.7

Vendor Advisory: https://github.com/solspace/craft-freeform/security/advisories/GHSA-jp3q-wwp3-pwv9

Restart Required: No

Instructions:

1. Update the Freeform plugin to version 5.14.7 or later via Craft Plugin Store or Composer. 2. Verify the update completed successfully. 3. Clear any Craft CMS caches if necessary.

🔧 Temporary Workarounds

Restrict form creation permissions

all

Temporarily remove 'create/edit forms' permissions from all non-essential users until patching is complete.

Adjust user permissions in Craft CMS Control Panel under Settings → Users

Content Security Policy (CSP)

all

Implement a strict CSP header to mitigate XSS impact by restricting script execution sources.

Add Content-Security-Policy header to web server configuration

🧯 If You Can't Patch

  • Immediately audit and restrict user permissions to minimize accounts with form creation/edit capabilities
  • Implement web application firewall (WAF) rules to detect and block XSS payload patterns in form submissions

🔍 How to Verify

Check if Vulnerable:

Check the Freeform plugin version in Craft CMS Control Panel under Settings → Plugins. If version is below 5.14.7, the system is vulnerable.

Check Version:

Check via Craft CMS admin panel or run: composer show solspace/craft-freeform

Verify Fix Applied:

After updating, verify the Freeform plugin shows version 5.14.7 or higher in the Craft Control Panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual form label modifications containing script tags or JavaScript code
  • Multiple form edits from single user in short timeframe
  • Admin user sessions accessing forms with suspicious content

Network Indicators:

  • HTTP POST requests to form builder endpoints with script tags in payloads
  • Outbound connections from admin sessions to unexpected domains

SIEM Query:

source="craft_cms_logs" AND (message="*<script>*" OR message="*javascript:*") AND (path="*/freeform/*" OR component="freeform")

🔗 References

📤 Share & Export