Description
The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to SQL Injection via the 'inputs' parameter in versions up to, and including, 1.15.42 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-05-05
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Form Maker by 10Web plugin allows an attacker to inject SQL through the 'inputs' parameter because it is not properly escaped and is included directly in an SQL query. This injection can append arbitrary statements to the existing query, enabling the adversary to read sensitive data from the database. The vulnerability is a classic SQL injection issue (CWE‑89) that compromises the confidentiality of application data.

Affected Systems

Vulnerable installations are those running the Form Maker by 10Web – Mobile‑Friendly Drag & Drop Contact Form Builder WordPress plugin that are at or below version 1.15.42. Any WordPress site using this plugin copy is affected.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity vulnerability. Because it is unauthenticated, an attacker only needs to send requests to the site, making it remotely exploitable over the Internet. The EPSS score is not available, so the exact likelihood of exploitation is uncertain, but the lack of a KEV listing does not diminish the risk; the flaw remains actively exploitable if the plugin is not updated.

Generated by OpenCVE AI on May 5, 2026 at 09:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the plugin to a version newer than 1.15.42 to remove the vulnerable code.
  • If an immediate upgrade is not possible, restrict external access to the plugin’s input handling endpoint by allowing only authenticated users or administrative IP ranges.
  • Review the plugin’s code and replace the raw SQL usage with prepared statements or WordPress database abstraction functions such as $wpdb->prepare, ensuring all request parameters, especially 'inputs', are properly sanitized.

Generated by OpenCVE AI on May 5, 2026 at 09:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared 10web
10web form Maker By 10web – Mobile-friendly Drag & Drop Contact Form Builder
Wordpress
Wordpress wordpress
Vendors & Products 10web
10web form Maker By 10web – Mobile-friendly Drag & Drop Contact Form Builder
Wordpress
Wordpress wordpress

Tue, 05 May 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to SQL Injection via the 'inputs' parameter in versions up to, and including, 1.15.42 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder <= 1.15.42 - Unauthenticated SQL Injection via 'inputs'
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

10web Form Maker By 10web – Mobile-friendly Drag & Drop Contact Form Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-05T07:42:06.700Z

Reserved: 2026-02-27T18:36:25.127Z

Link: CVE-2026-3359

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T09:16:03.827

Modified: 2026-05-05T09:16:03.827

Link: CVE-2026-3359

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T09:30:21Z

Weaknesses