CVE-2026-3359

10Web · Form Maker

The Form Maker by 10Web WordPress plugin contains an SQL injection vulnerability in the 'inputs' parameter, enabling potential unauthorized database interaction.

Executive summary

An SQL injection flaw in the 10Web Form Maker plugin for WordPress allows attackers to potentially compromise database integrity and confidentiality.

Vulnerability

The vulnerability manifests as an SQL injection within the 'inputs' parameter. This allows an attacker to manipulate backend database queries, potentially leading to unauthorized data retrieval or modification.

Business impact

With a CVSS score of 7.5, this vulnerability represents a high-risk entry point for attackers to bypass application logic. Successful exploitation can result in full database exposure, leading to severe reputational damage and loss of sensitive user information.

Remediation

Immediate Action: Apply the latest security update for the Form Maker plugin provided by 10Web immediately.

Proactive Monitoring: Monitor database query logs for unusual activity or signs of unauthorized data access originating from the Form Maker plugin components.

Compensating Controls: Utilize a Web Application Firewall (WAF) to filter and block requests containing suspicious SQL injection patterns directed at the 'inputs' parameter.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Urgent patching is required to secure the environment against this SQL injection vector. Administrators must verify that they are running the most recent version of the plugin and audit site logs for any evidence of prior exploitation attempts.