Gravity Forms Breach Hits 1M WordPress Sites

In a startling revelation for the WordPress community, a critical security breach has been uncovered in the widely used Gravity Forms plugin, signaling a sophisticated supply chain attack.
Gravity Forms Breach Hits 1M WordPress Sites
Written by Victoria Mossi

In a startling revelation for the WordPress community, a critical security breach has been uncovered in the widely used Gravity Forms plugin, signaling a sophisticated supply chain attack.

According to a detailed report by Patchstack, malicious code was embedded in manual installers available directly from the official Gravity Forms website, affecting versions 2.9.11.1 and 2.9.12. This incident has raised alarms among developers and site administrators who rely on the plugin for creating complex forms on over 1 million WordPress sites worldwide.

The backdoor, as identified by Patchstack, allows attackers to execute arbitrary code, potentially granting full control over compromised websites. This breach is particularly concerning because it originates from a trusted source—the official download site—highlighting the growing threat of supply chain attacks in the open-source ecosystem.

A Deeper Look into the Breach

Updates from Patchstack reveal that suspicious activity related to one of the backdoors was observed as recently as November 8, 2025, involving a specific parameter, gf_api_token, and requests from an IP address attempting to exploit sites with spoofed user agents. This indicates that attackers are actively seeking to leverage the compromised versions, posing an immediate risk to users who have not yet updated their installations.

The Gravity Forms team responded swiftly, releasing version 2.9.13 to address the issue and ensure users can update safely. However, the incident underscores a critical vulnerability in the plugin’s distribution chain, prompting questions about how such a breach occurred and what measures are being implemented to prevent future compromises.

Implications for WordPress Security

Supply chain attacks, like the one affecting Gravity Forms, are notoriously difficult to detect because they exploit trust in official sources. As reported by BleepingComputer, this incident marks a significant escalation in tactics used by cybercriminals targeting WordPress plugins, which are often integral to website functionality. The compromise of a premium plugin like Gravity Forms, which requires a paid license, suggests that even commercial software is not immune to such threats.

For industry insiders, this breach serves as a stark reminder of the importance of rigorous security audits and monitoring, even for trusted vendors. The WordPress ecosystem, while powerful and flexible, remains a prime target for attackers due to its widespread adoption and the sheer number of plugins available, many of which are developed by small teams with limited resources for security.

Steps Forward and Community Response

In the wake of this incident, Gravity Forms has issued a security notice on their blog, urging users to update to the latest version immediately and review their systems for signs of compromise. This proactive communication is crucial, but it also places the onus on individual site owners to act quickly, a challenge for those managing multiple sites or lacking technical expertise.

The broader WordPress community must now grapple with enhancing security practices, from vetting plugin sources to implementing stricter access controls. As Patchstack continues to monitor for further exploit attempts, their role in identifying and publicizing this breach highlights the importance of independent security research in safeguarding digital infrastructure. This incident with Gravity Forms is not just a wake-up call—it’s a clarion call for systemic change in how plugins are developed, distributed, and secured in an increasingly hostile cyber landscape.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us