Skip to main content

CVE-2024-13053: CWE-79 Cross-Site Scripting (XSS) in Unknown Form Maker by 10Web

Medium
VulnerabilityCVE-2024-13053cvecve-2024-13053cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:06:58 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Form Maker by 10Web

Description

The Form Maker by 10Web WordPress plugin before 1.15.33 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 07:40:52 UTC

Technical Analysis

CVE-2024-13053 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) found in the WordPress plugin 'Form Maker by 10Web' prior to version 1.15.33. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject and store malicious scripts. This stored XSS can be triggered even when the WordPress capability 'unfiltered_html' is disabled, which is common in multisite WordPress setups to restrict HTML input. The vulnerability requires high privileges (admin level) and user interaction to exploit, as an attacker must have access to the plugin settings interface to inject the payload. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based, with low attack complexity, but requiring high privileges and user interaction. The impact includes limited confidentiality and integrity compromise, as malicious scripts could execute in the context of other administrators or users viewing the affected settings, potentially leading to session hijacking, privilege escalation, or further attacks within the WordPress environment. There are no known exploits in the wild at this time, and no official patches have been linked yet. The vulnerability affects all versions before 1.15.33, and the plugin is widely used for creating forms on WordPress sites, which are common across many industries and organizations.

Potential Impact

For European organizations using WordPress sites with the Form Maker by 10Web plugin, this vulnerability poses a moderate risk. Since exploitation requires administrator-level access, the threat is primarily from insider threats or attackers who have already compromised admin credentials. Successful exploitation could allow attackers to execute malicious scripts in the admin interface, potentially leading to session hijacking, unauthorized changes to site content or configuration, and lateral movement within the WordPress environment. This could disrupt business operations, damage reputation, and lead to data leakage. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if the vulnerability is exploited. Multisite WordPress installations, common in large organizations, are particularly at risk due to the disabling of 'unfiltered_html' capability, which this vulnerability bypasses. Although the vulnerability does not directly allow remote code execution or full site takeover without prior admin access, it lowers the security posture and could be leveraged as part of a multi-stage attack.

Mitigation Recommendations

European organizations should immediately verify if they use the Form Maker by 10Web plugin and identify the plugin version. If the version is prior to 1.15.33, they should prioritize updating to the latest version as soon as it becomes available. In the absence of an official patch, organizations can mitigate risk by restricting admin access strictly to trusted personnel, implementing strong multi-factor authentication (MFA) for all admin accounts, and monitoring admin activities for suspicious behavior. Additionally, applying Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the plugin’s settings pages can provide temporary protection. Organizations should also audit their multisite WordPress configurations to ensure that capability restrictions are properly enforced and consider additional input validation or sanitization plugins as a defense-in-depth measure. Regular security training for administrators on safe plugin management and recognizing phishing or credential compromise attempts will reduce the risk of initial admin account takeover.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-12-30T18:42:51.341Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec208

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:40:52 AM

Last updated: 8/17/2025, 2:05:32 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats