Description
The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.15.35. This is due to the plugin's default file upload allowlist including SVG files combined with weak substring-based extension validation. This makes it possible for unauthenticated attackers to upload malicious SVG files containing JavaScript code that will execute when viewed by administrators or site visitors via file upload fields in forms granted they can submit forms.
Published: 2026-02-03
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross-site scripting via unauthenticated SVG upload
Action: Patch immediately
AI Analysis

Impact

An unauthenticated attacker can upload a malicious SVG file because the plugin allows SVG files in its default allowlist and performs only weak substring checks on the file extension. The uploaded SVG can contain JavaScript that runs when the file is rendered by a browser, affecting anyone who views the file, including administrators and site visitors who submit the form.

Affected Systems

Vulnerable versions are all 10Web Form Maker releases up to and including 1.15.35 for WordPress. The product is a mobile-friendly drag-and-drop contact form builder available as a WordPress plugin. The issue resides in the file upload logic within the form handling code of the plugin.

Risk and Exploitability

The CVSS score of 7.2 indicates a high likelihood of impactful exploitation. EPSS is less than 1%, suggesting low overall exploitation probability at present, and the vulnerability is not currently listed in CISA's KEV catalog. Exploitation requires no special privileges; an attacker simply submits a form with a crafted SVG file. If the form is accessible to site visitors, the malicious code runs in their browsers and could lead to data theft or session hijacking, while administrators viewing the uploaded file may suffer credential compromise or site control.

Generated by OpenCVE AI on April 15, 2026 at 18:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Form Maker plugin to the latest version (≥ 1.15.36) to remove the vulnerable upload logic.
  • Restrict the file upload allowlist to exclude SVG files or enforce strict MIME type validation so that only allowed non-executable types are accepted.
  • Sanitize or strip executable content from any uploaded files, for example by removing <script> tags from SVG files or using a dedicated library to clean SVG uploads.

Generated by OpenCVE AI on April 15, 2026 at 18:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared 10web
10web form Maker
Wordpress
Wordpress wordpress
Vendors & Products 10web
10web form Maker
Wordpress
Wordpress wordpress

Tue, 03 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.15.35. This is due to the plugin's default file upload allowlist including SVG files combined with weak substring-based extension validation. This makes it possible for unauthenticated attackers to upload malicious SVG files containing JavaScript code that will execute when viewed by administrators or site visitors via file upload fields in forms granted they can submit forms.
Title Form Maker by 10Web <= 1.15.35 - Unauthenticated Stored Cross-Site Scripting via SVG file
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

10web Form Maker
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:03:54.659Z

Reserved: 2026-01-16T19:16:43.079Z

Link: CVE-2026-1065

cve-icon Vulnrichment

Updated: 2026-02-03T15:29:04.768Z

cve-icon NVD

Status : Deferred

Published: 2026-02-03T07:16:11.893

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1065

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:00:12Z

Weaknesses