Vulnerability Description
The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.2. This is due to the plugin accepting a user-controlled 'role' parameter from POST data during user registration without validating it against the form's configured default_user_role setting. This makes it possible for unauthenticated attackers to create administrator accounts by tampering with the role parameter during registration.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://diviengine.com/divi-form-builder-changelog/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/72154404-f956-4ea2-96e
FAQ
What is CVE-2026-5118?
CVE-2026-5118 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.2. This is due to the plugin accepting a user-controlled 'role' parameter from PO...
How severe is CVE-2026-5118?
CVE-2026-5118 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-5118?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.