CVE-2024-13053: CWE-79 Cross-Site Scripting (XSS) in Unknown Form Maker by 10Web
The Form Maker by 10Web WordPress plugin before 1.15.33 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-13053 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) found in the WordPress plugin 'Form Maker by 10Web' prior to version 1.15.33. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject and store malicious scripts. This stored XSS can be triggered even when the WordPress capability 'unfiltered_html' is disabled, which is common in multisite WordPress setups to restrict HTML input. The vulnerability requires high privileges (admin level) and user interaction to exploit, as an attacker must have access to the plugin settings interface to inject the payload. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based, with low attack complexity, but requiring high privileges and user interaction. The impact includes limited confidentiality and integrity compromise, as malicious scripts could execute in the context of other administrators or users viewing the affected settings, potentially leading to session hijacking, privilege escalation, or further attacks within the WordPress environment. There are no known exploits in the wild at this time, and no official patches have been linked yet. The vulnerability affects all versions before 1.15.33, and the plugin is widely used for creating forms on WordPress sites, which are common across many industries and organizations.
Potential Impact
For European organizations using WordPress sites with the Form Maker by 10Web plugin, this vulnerability poses a moderate risk. Since exploitation requires administrator-level access, the threat is primarily from insider threats or attackers who have already compromised admin credentials. Successful exploitation could allow attackers to execute malicious scripts in the admin interface, potentially leading to session hijacking, unauthorized changes to site content or configuration, and lateral movement within the WordPress environment. This could disrupt business operations, damage reputation, and lead to data leakage. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if the vulnerability is exploited. Multisite WordPress installations, common in large organizations, are particularly at risk due to the disabling of 'unfiltered_html' capability, which this vulnerability bypasses. Although the vulnerability does not directly allow remote code execution or full site takeover without prior admin access, it lowers the security posture and could be leveraged as part of a multi-stage attack.
Mitigation Recommendations
European organizations should immediately verify if they use the Form Maker by 10Web plugin and identify the plugin version. If the version is prior to 1.15.33, they should prioritize updating to the latest version as soon as it becomes available. In the absence of an official patch, organizations can mitigate risk by restricting admin access strictly to trusted personnel, implementing strong multi-factor authentication (MFA) for all admin accounts, and monitoring admin activities for suspicious behavior. Additionally, applying Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the plugin’s settings pages can provide temporary protection. Organizations should also audit their multisite WordPress configurations to ensure that capability restrictions are properly enforced and consider additional input validation or sanitization plugins as a defense-in-depth measure. Regular security training for administrators on safe plugin management and recognizing phishing or credential compromise attempts will reduce the risk of initial admin account takeover.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-13053: CWE-79 Cross-Site Scripting (XSS) in Unknown Form Maker by 10Web
Description
The Form Maker by 10Web WordPress plugin before 1.15.33 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-13053 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) found in the WordPress plugin 'Form Maker by 10Web' prior to version 1.15.33. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject and store malicious scripts. This stored XSS can be triggered even when the WordPress capability 'unfiltered_html' is disabled, which is common in multisite WordPress setups to restrict HTML input. The vulnerability requires high privileges (admin level) and user interaction to exploit, as an attacker must have access to the plugin settings interface to inject the payload. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based, with low attack complexity, but requiring high privileges and user interaction. The impact includes limited confidentiality and integrity compromise, as malicious scripts could execute in the context of other administrators or users viewing the affected settings, potentially leading to session hijacking, privilege escalation, or further attacks within the WordPress environment. There are no known exploits in the wild at this time, and no official patches have been linked yet. The vulnerability affects all versions before 1.15.33, and the plugin is widely used for creating forms on WordPress sites, which are common across many industries and organizations.
Potential Impact
For European organizations using WordPress sites with the Form Maker by 10Web plugin, this vulnerability poses a moderate risk. Since exploitation requires administrator-level access, the threat is primarily from insider threats or attackers who have already compromised admin credentials. Successful exploitation could allow attackers to execute malicious scripts in the admin interface, potentially leading to session hijacking, unauthorized changes to site content or configuration, and lateral movement within the WordPress environment. This could disrupt business operations, damage reputation, and lead to data leakage. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if the vulnerability is exploited. Multisite WordPress installations, common in large organizations, are particularly at risk due to the disabling of 'unfiltered_html' capability, which this vulnerability bypasses. Although the vulnerability does not directly allow remote code execution or full site takeover without prior admin access, it lowers the security posture and could be leveraged as part of a multi-stage attack.
Mitigation Recommendations
European organizations should immediately verify if they use the Form Maker by 10Web plugin and identify the plugin version. If the version is prior to 1.15.33, they should prioritize updating to the latest version as soon as it becomes available. In the absence of an official patch, organizations can mitigate risk by restricting admin access strictly to trusted personnel, implementing strong multi-factor authentication (MFA) for all admin accounts, and monitoring admin activities for suspicious behavior. Additionally, applying Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the plugin’s settings pages can provide temporary protection. Organizations should also audit their multisite WordPress configurations to ensure that capability restrictions are properly enforced and consider additional input validation or sanitization plugins as a defense-in-depth measure. Regular security training for administrators on safe plugin management and recognizing phishing or credential compromise attempts will reduce the risk of initial admin account takeover.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-12-30T18:42:51.341Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec208
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 7:40:52 AM
Last updated: 8/17/2025, 2:05:32 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.