PT-2026-33401 · 10Web · Form Maker By 10Web – Mobile-Friendly Drag & Drop Contact Form Builder
Sein Linn
·
Published
2026-04-17
·
Updated
2026-04-17
·
CVE-2026-3330
CVSS v3.1
4.9
Medium
| AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
The Form Maker by 10Web plugin for WordPress is vulnerable to SQL Injection via the 'ip search', 'startdate', 'enddate', 'username search', and 'useremail search' parameters in all versions up to, and including, 1.15.40. This is due to the
WDW FM Library::validate data() method calling stripslashes() on user input (removing WordPress's wp magic quotes() protection) and the FMModelSubmissions fm::get labels parameters() function directly concatenating user-supplied values into SQL queries without using $wpdb->prepare(). This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Additionally, the Submissions controller skips nonce verification for the display task, which means this vulnerability can be triggered via CSRF by tricking an administrator into clicking a crafted link.Fix
SQL injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Form Maker By 10Web – Mobile-Friendly Drag & Drop Contact Form Builder