Sucuri’s latest security report reveals a concerning 28 percent increase in hacks targeting WPForms plugins, one of the most widely used form-building solutions for WordPress sites. This spike represents a significant shift in attacker tactics, moving beyond general WordPress vulnerabilities to specifically exploit weaknesses in popular third-party plugins. The rise in WPForms-specific attacks underscores how cybercriminals have evolved to target established tools with large user bases, making this plugin family a prime vector for breaches in 2025 and beyond.
The timing of this threat is critical because WPForms powers contact forms, lead generation systems, and payment integrations on hundreds of thousands of WordPress sites. A single compromised form can expose customer data, steal payment information, or inject malware directly into the site’s front end. For digital agencies, SaaS platforms, and e-commerce businesses relying on WPForms for customer engagement, this 28 percent surge demands immediate attention and remediation.
Table of Contents
- What’s Driving the 28 Percent Spike in WPForms Plugin Attacks?
- The Vulnerability Landscape in WPForms: What Attackers Exploit
- Real-World Breach Scenarios: How WPForms Hacks Unfold
- Protecting Your WordPress Site: WPForms Security Best Practices
- Limitations of Default Plugin Security and Advanced Hardening
- Monitoring and Detection: Catching Compromises Early
- The Broader Landscape and Future Outlook
- Conclusion
- Frequently Asked Questions
What’s Driving the 28 Percent Spike in WPForms Plugin Attacks?
The increase in WPForms hacks is tied to several converging factors. First, WPForms’ massive market share makes it an attractive target—the more websites using a plugin, the greater the potential return for attackers scanning the internet for vulnerable installations. Many WordPress site owners operate with outdated plugin versions, delayed security updates, or insufficient access controls, creating low-hanging fruit for automated vulnerability scanners. Attackers have shifted from broad, generic WordPress exploits to targeted campaigns against popular, known plugins with documented security flaws.
Second, form plugins are inherently high-value targets because they capture sensitive data at the point of entry. A compromised WPForms form can intercept customer inquiries, payment details, email addresses, and phone numbers before they reach legitimate inboxes. Real-world examples show attackers injecting redirect scripts into WPForms contact forms that silently log user submissions to attacker-controlled servers while the site owner remains unaware. Some campaigns have modified form handlers to siphon payment data in real time, especially on sites using WPForms with payment gateway integrations.

The Vulnerability Landscape in WPForms: What Attackers Exploit
WPForms, like most WordPress plugins, has had multiple documented vulnerabilities over the years. Common attack vectors include unauthenticated admin access due to insecure REST API endpoints, SQL injection in form handlers, cross-site scripting (XSS) flaws that allow malicious code injection, and insufficient permission checks that let attackers modify form data post-submission. A significant limitation of WPForms security is that many site owners are unaware of the plugin’s REST API endpoints, which can be exposed if not properly secured. The free version of WPForms, in particular, has been flagged for security gaps in older releases.
Even when Sucuri and wordfence publish fixes, adoption lags significantly—some site owners wait months or longer to update, leaving known vulnerabilities open. Additionally, WPForms integrations with third-party services (payment processors, email marketing platforms, CRM systems) introduce additional risk. A weakness in one integration point can compromise the entire workflow. Site owners should be aware that updating WPForms alone is insufficient if they’ve installed vulnerable add-ons or outdated integration plugins alongside it.
Real-World Breach Scenarios: How WPForms Hacks Unfold
In a typical WPForms breach, attackers exploit either a known CVE (Common Vulnerabilities and Exposures) or a zero-day vulnerability to gain admin-level access. Once inside, they may inject hidden fields into forms to collect additional data, replace email notifications to redirect submissions to attacker accounts, or embed JavaScript that runs on the form page itself. One documented case involved attackers injecting a skimmer into a WPForms checkout form on an e-commerce site, capturing credit card information from dozens of transactions before the breach was discovered weeks later.
Another common scenario involves attackers redirecting form data to external servers. A site owner might not notice for months if they’re not actively reviewing form submission logs. In one incident, a WordPress agency discovered that hundreds of client leads from an estimated year’s worth of form submissions had been siphoned to an attacker’s email address without anyone noticing the compromise. The damage wasn’t just the loss of data—it was the reputational harm of contacting affected customers to disclose the breach.

Protecting Your WordPress Site: WPForms Security Best Practices
Site owners have several actionable steps to reduce their attack surface. First, keep WPForms and all related add-ons updated to the latest version immediately upon release. Set up automatic updates if possible, which removes the dependency on manual monitoring. Second, audit your existing WPForms to identify which ones are actively used and which are legacy forms that can be disabled or removed entirely.
Third, limit WPForms REST API access by disabling endpoints you’re not actively using—this prevents attackers from enumerating or exploiting hidden admin endpoints. A practical comparison: A site with twenty active contact forms and five disabled forms is far more vulnerable than one with only the essential three. Each form is a potential attack surface, so consolidation and cleanup reduce risk. Additionally, implement Web Application Firewall (WAF) rules specific to WPForms—solutions like Sucuri and Wordfence offer pre-configured rulesets that detect and block common WPForms attack patterns. Consider also moving sensitive form data to a separate, isolated database with restricted access, rather than storing everything in the default WordPress database where a general compromise could expose all submissions at once.
Limitations of Default Plugin Security and Advanced Hardening
WPForms’ built-in security features are adequate for most use cases, but they have constraints. The plugin relies on WordPress’s user role system and permission checks, which means a compromised WordPress admin account gives attackers full control over all forms. If a site has weak password policies or shared admin credentials, this becomes a critical vulnerability. One limitation many site owners overlook is that WPForms submissions are stored in the WordPress database by default, making them accessible to any attacker who gains database-level access.
Advanced hardening requires going beyond WPForms itself. This includes implementing Web Application Firewalls, Content Security Policy headers to prevent XSS, and regular security audits using tools like MalCare or Sucuri’s Site Integrity Monitor. A tradeoff to be aware of: more restrictive security policies can interfere with legitimate functionality. For example, overly aggressive CSP headers might block WPForms scripts from loading, breaking form functionality. Testing after implementing security measures is essential to ensure you’re not trading security gains for a broken user experience.

Monitoring and Detection: Catching Compromises Early
Detecting WPForms attacks early is critical to minimizing damage. Enable form submission logging and review logs regularly for suspicious patterns—a sudden spike in submissions, submissions to odd email addresses, or repeated form resets might indicate an active compromise. Use plugins like Sucuri’s Security or Wordfence to set up file integrity monitoring, which alerts you if WPForms core files or any related files are modified unexpectedly.
A practical example: A SaaS company running WPForms for user signups detected unauthorized form data flows after installing a file integrity monitor. The monitor flagged a modified WPForms hook file and alerted the team within hours, allowing them to stop the attack before customer data reached attacker servers. Without the monitor, the breach might have continued undetected for weeks.
The Broader Landscape and Future Outlook
The 28 percent rise in WPForms attacks reflects a broader trend in plugin-specific targeting. As WordPress hardens its core and site owners become more security-conscious, attackers are shifting focus to the ecosystem of third-party plugins where security practices are more inconsistent. This pattern will likely continue—expect to see future reports highlighting similar surges in attacks against other popular plugins like Contact Form 7, Elementor, or WooCommerce as attackers follow the path of least resistance.
Looking ahead, WordPress plugin security will need to evolve. Enhanced code review processes, mandatory security audits before plugin publication on WordPress.org, and better default configurations would all reduce the attack surface. For now, site owners must take responsibility for their own security posture by staying vigilant about updates, limiting plugin usage, and deploying additional monitoring layers beyond what the plugins themselves offer.
Conclusion
The Sucuri report of a 28 percent rise in WPForms hacks is a clear signal that popular WordPress plugins are increasingly in the crosshairs of organized attackers. WPForms’ widespread adoption makes it a lucrative target, and the combination of legacy installations, delayed updates, and inherent vulnerabilities in plugin architecture creates persistent risk. Sites using WPForms should treat this not as an alarm but as confirmation of what security researchers have long known: third-party plugins require active management and monitoring.
The steps are straightforward: update immediately, audit your forms, reduce unnecessary instances, deploy monitoring, and consider hardening measures like WAFs. Organizations handling sensitive customer data through WPForms should also conduct a historical review of their submission logs to identify any potential past compromises. By taking these actions now, you protect not only your own reputation but also the data of your customers and clients who depend on your forms to be secure.
Frequently Asked Questions
How do I check if my WPForms installation has been compromised?
Review form submission logs for unfamiliar entries or redirected data. Check the WPForms plugin files for unauthorized modifications using a security plugin like Sucuri or Wordfence. Look for hidden form fields, modified email notifications, or unexpected JavaScript in form pages. If you suspect a breach, scan your site with a specialized malware scanner and consider hiring a security professional to conduct a forensic review.
Does updating WPForms alone protect me from these attacks?
Updating is necessary but not sufficient. You should also audit your forms, disable unused ones, restrict REST API access, implement a Web Application Firewall, and monitor for suspicious activity. Updates patch known vulnerabilities, but ongoing security requires multiple layers.
Are other form plugins like Contact Form 7 at risk of similar attacks?
Yes. Any widely-used plugin with large installed bases is a potential target for attackers. Contact Form 7, Gravity Forms, and Elementor have all experienced similar security issues. The pattern is predictable: popular plugins attract attackers because the potential return justifies the effort.
What’s the best way to monitor WPForms submissions for suspicious activity?
Use file integrity monitoring to detect code changes, review submission logs regularly, and set up alerts for unusual patterns like high submission volumes or submissions to unusual addresses. Some security plugins allow you to export and analyze submission data for forensic purposes.
Should I move to a SaaS form service instead of WPForms?
SaaS form services may offer some security advantages due to professional management and isolated infrastructure, but they introduce their own tradeoffs: data travels over the internet, third-party access to customer data, and dependency on a vendor’s security practices. For most WordPress sites, properly secured WPForms is adequate if actively maintained.
How often should I update WPForms?
Install updates as soon as they’re released, especially security patches. For minor and patch updates, configure automatic updates if your hosting allows it. Check the WPForms changelog before updating major versions to ensure compatibility with your integrations and add-ons.




