PT-2026-33401 · 10Web · Form Maker By 10Web – Mobile-Friendly Drag & Drop Contact Form Builder

Sein Linn

·

Published

2026-04-17

·

Updated

2026-04-17

·

CVE-2026-3330

CVSS v3.1

4.9

Medium

AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
The Form Maker by 10Web plugin for WordPress is vulnerable to SQL Injection via the 'ip search', 'startdate', 'enddate', 'username search', and 'useremail search' parameters in all versions up to, and including, 1.15.40. This is due to the WDW FM Library::validate data() method calling stripslashes() on user input (removing WordPress's wp magic quotes() protection) and the FMModelSubmissions fm::get labels parameters() function directly concatenating user-supplied values into SQL queries without using $wpdb->prepare(). This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Additionally, the Submissions controller skips nonce verification for the display task, which means this vulnerability can be triggered via CSRF by tricking an administrator into clicking a crafted link.

Fix

SQL injection

Weakness Enumeration

Related Identifiers

CVE-2026-3330

Affected Products

Form Maker By 10Web – Mobile-Friendly Drag & Drop Contact Form Builder