Brief Summary: CVE-2026-3359 Unauthenticated SQL Injection in Form Maker by 10Web WordPress Plugin

A short review of CVE-2026-3359, a high severity unauthenticated SQL Injection vulnerability in the Form Maker by 10Web WordPress plugin affecting versions up to 1.15.42, which allows remote attackers to extract sensitive database information without authentication.

CVE Analysis

4 min read

ZeroPath CVE Analysis
ZeroPath CVE Analysis

2026-05-05

Brief Summary: CVE-2026-3359 Unauthenticated SQL Injection in Form Maker by 10Web WordPress Plugin
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

An unauthenticated SQL Injection in the Form Maker by 10Web WordPress plugin allows remote attackers to extract sensitive information directly from the database without any credentials. With over 30,000 active installations, this plugin's broad footprint across WordPress sites makes CVE-2026-3359 a meaningful risk for organizations that rely on it for contact forms and user input collection.

Form Maker by 10Web is a drag and drop contact form builder plugin for WordPress, designed to let site administrators create mobile friendly forms without writing code. It maintains a significant presence in the WordPress plugin ecosystem with tens of thousands of active installations and compatibility tested up to WordPress 6.9.4. Its popularity among small and mid sized businesses makes vulnerabilities in this plugin particularly relevant to the broader WordPress security landscape.

Technical Information

CVE-2026-3359 is classified under CWE-89: Improper Neutralization of Special Elements used in an SQL Command. The vulnerability exists in the handling of the inputs parameter within the plugin. The core issue is twofold: the plugin does not sufficiently escape user supplied data passed through this parameter, and the existing SQL query that consumes this data is not properly constructed using prepared statements.

In WordPress plugin development, the standard practice for safe database interaction is to use $wpdb->prepare() to parameterize queries, ensuring that user input cannot alter the structure of the SQL statement. When this preparation step is missing or incomplete, and input escaping is also insufficient, the door opens for classic SQL Injection.

The CVSS 3.x vector for this vulnerability is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, which breaks down as follows:

CVSS ComponentValueMeaning
Attack VectorNetworkExploitable remotely over the network
Attack ComplexityLowNo special conditions required
Privileges RequiredNoneNo authentication needed
User InteractionNoneNo victim action required
ScopeUnchangedImpact limited to the vulnerable component
ConfidentialityHighFull read access to database contents
IntegrityNoneNo data modification
AvailabilityNoneNo denial of service

The attack flow, based on the available information, proceeds as follows:

  1. An attacker identifies a WordPress site running Form Maker by 10Web version 1.15.42 or earlier.
  2. The attacker crafts a request that includes a malicious payload in the inputs parameter. Because the parameter value is not properly escaped or parameterized before being incorporated into a SQL query, the injected SQL is executed by the database.
  3. The attacker appends additional SQL queries (this is an append style injection, not a replacement) to the existing query logic. This allows the attacker to use techniques such as UNION based extraction or conditional (blind) injection to read arbitrary data from the database.
  4. Sensitive information, which could include WordPress user credentials, email addresses, form submission data, or other stored content, is returned to the attacker.

The fact that this vulnerability requires no authentication is particularly notable. Any internet facing WordPress site running a vulnerable version of this plugin is exposed to automated scanning and exploitation without any barrier.

Affected Systems and Versions

The vulnerability affects the following:

SoftwareAffected VersionsFixed Version
Form Maker by 10Web (WordPress plugin)All versions up to and including 1.15.421.15.43

Any WordPress installation running Form Maker by 10Web at version 1.15.42 or earlier is vulnerable, regardless of the WordPress core version.

Vendor Security History

10Web has a documented track record of addressing security issues in the Form Maker plugin. The changelog indicates that previous SQL injection vulnerabilities and minor security flaws were fixed in version 1.14.3. The current vulnerability, CVE-2026-3359, was explicitly addressed in the 1.15.43 release. While the vendor's responsiveness to reported issues is a positive signal, the recurrence of SQL injection specifically points to a systemic challenge with input validation and query parameterization in the plugin's codebase. Organizations evaluating this plugin should weigh this pattern when assessing long term risk.

References

Detect & fix
what others miss

Security magnifying glass visualization