Description
The MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.1.0. This is due to the use of a forgeable cookie value derived only from the entry ID and current user ID without a server-side secret. This makes it possible for unauthenticated attackers to access form submission entry data via MetForm shortcodes for entries created within the transient TTL (default is 15 minutes).
Published: 2026-01-24
Score: 3.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Apply Patch
AI Analysis

Impact

The MetForm plugin for Elementor is vulnerable because an attacker can forge a cookie value that consists only of the form entry ID and the current user ID, without any server‑side secret. By creating a forged cookie for a short‑lived entry (cached for 15 minutes by default), an unauthenticated user can embed the MetForm shortcode that points to that entry ID and retrieve the entire submission data. The consequence is the exposure of any personal, financial, or otherwise sensitive information that users entered into survey or quiz forms. This flaw is an instance of Improper Authentication, classified as CWE‑287.

Affected Systems

All releases of the MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin distributed by roxnor, specifically versions up to and including 4.1.0. The vulnerability is confined to the MetForm plugin itself; other WordPress core components or plugins are not directly affected by this forged cookie mechanism.

Risk and Exploitability

With a CVSS score of 3.7, the vulnerability carries moderate severity, and an EPSS score of less than 1% indicates a low probability of current exploitation. It is not listed in the CISA KEV catalog. The attack requires no user authentication; the attacker only needs knowledge or a guess of a valid entry ID and user ID that exist within the transient cache. Because the data is cached only for 15 minutes, the window of opportunity is limited, but during that period an attacker can read the exposed submission data, potentially revealing sensitive information. Due to the narrow exposure window combined with the moderate severity, immediate remediation is advised to prevent data leakage.

Generated by OpenCVE AI on April 15, 2026 at 19:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the MetForm plugin to the latest version that removes the forgeable cookie mechanism.
  • If an immediate update is unavailable, block or remove any MetForm shortcodes that expose individual entry data until the plugin is patched, or restrict such shortcodes to authenticated users only.
  • Clear all existing form entry transients from the database or using WP‑CLI commands to eliminate cached data that could still be exposed.

Generated by OpenCVE AI on April 15, 2026 at 19:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Elementor
Elementor elementor
Roxnor
Roxnor metform Contact Form Survey Quiz Custom Form Builder For Elementor
Wordpress
Wordpress wordpress
Vendors & Products Elementor
Elementor elementor
Roxnor
Roxnor metform Contact Form Survey Quiz Custom Form Builder For Elementor
Wordpress
Wordpress wordpress

Sat, 24 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
Description The MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.1.0. This is due to the use of a forgeable cookie value derived only from the entry ID and current user ID without a server-side secret. This makes it possible for unauthenticated attackers to access form submission entry data via MetForm shortcodes for entries created within the transient TTL (default is 15 minutes).
Title MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor <= 4.1.0 - Unauthenticated Form Submission Exposure via Forgeable Cookie Value
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Elementor Elementor
Roxnor Metform Contact Form Survey Quiz Custom Form Builder For Elementor
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:26:32.469Z

Reserved: 2026-01-06T01:17:56.319Z

Link: CVE-2026-0633

cve-icon Vulnrichment

Updated: 2026-01-26T17:47:52.431Z

cve-icon NVD

Status : Deferred

Published: 2026-01-24T09:15:52.843

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0633

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:15:12Z

Weaknesses