CVE-2024-13053: CWE-79 Cross-Site Scripting (XSS) in Unknown Form Maker by 10Web
The Form Maker by 10Web WordPress plugin before 1.15.33 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-13053 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) found in the WordPress plugin 'Form Maker by 10Web' prior to version 1.15.33. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject and store malicious scripts. This stored XSS can be triggered even when the WordPress capability 'unfiltered_html' is disabled, which is common in multisite WordPress setups to restrict HTML input. The vulnerability requires high privileges (admin level) and user interaction to exploit, as an attacker must have access to the plugin settings interface to inject the payload. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based, with low attack complexity, but requiring high privileges and user interaction. The impact includes limited confidentiality and integrity compromise, as malicious scripts could execute in the context of other administrators or users viewing the affected settings, potentially leading to session hijacking, privilege escalation, or further attacks within the WordPress environment. There are no known exploits in the wild at this time, and no official patches have been linked yet. The vulnerability affects all versions before 1.15.33, and the plugin is widely used for creating forms on WordPress sites, which are common across many industries and organizations.
Potential Impact
For European organizations using WordPress sites with the Form Maker by 10Web plugin, this vulnerability poses a moderate risk. Since exploitation requires administrator-level access, the threat is primarily from insider threats or attackers who have already compromised admin credentials. Successful exploitation could allow attackers to execute malicious scripts in the admin interface, potentially leading to session hijacking, unauthorized changes to site content or configuration, and lateral movement within the WordPress environment. This could disrupt business operations, damage reputation, and lead to data leakage. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if the vulnerability is exploited. Multisite WordPress installations, common in large organizations, are particularly at risk due to the disabling of 'unfiltered_html' capability, which this vulnerability bypasses. Although the vulnerability does not directly allow remote code execution or full site takeover without prior admin access, it lowers the security posture and could be leveraged as part of a multi-stage attack.
Mitigation Recommendations
European organizations should immediately verify if they use the Form Maker by 10Web plugin and identify the plugin version. If the version is prior to 1.15.33, they should prioritize updating to the latest version as soon as it becomes available. In the absence of an official patch, organizations can mitigate risk by restricting admin access strictly to trusted personnel, implementing strong multi-factor authentication (MFA) for all admin accounts, and monitoring admin activities for suspicious behavior. Additionally, applying Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the plugin’s settings pages can provide temporary protection. Organizations should also audit their multisite WordPress configurations to ensure that capability restrictions are properly enforced and consider additional input validation or sanitization plugins as a defense-in-depth measure. Regular security training for administrators on safe plugin management and recognizing phishing or credential compromise attempts will reduce the risk of initial admin account takeover.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-13053: CWE-79 Cross-Site Scripting (XSS) in Unknown Form Maker by 10Web
Description
The Form Maker by 10Web WordPress plugin before 1.15.33 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-13053 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) found in the WordPress plugin 'Form Maker by 10Web' prior to version 1.15.33. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject and store malicious scripts. This stored XSS can be triggered even when the WordPress capability 'unfiltered_html' is disabled, which is common in multisite WordPress setups to restrict HTML input. The vulnerability requires high privileges (admin level) and user interaction to exploit, as an attacker must have access to the plugin settings interface to inject the payload. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based, with low attack complexity, but requiring high privileges and user interaction. The impact includes limited confidentiality and integrity compromise, as malicious scripts could execute in the context of other administrators or users viewing the affected settings, potentially leading to session hijacking, privilege escalation, or further attacks within the WordPress environment. There are no known exploits in the wild at this time, and no official patches have been linked yet. The vulnerability affects all versions before 1.15.33, and the plugin is widely used for creating forms on WordPress sites, which are common across many industries and organizations.
Potential Impact
For European organizations using WordPress sites with the Form Maker by 10Web plugin, this vulnerability poses a moderate risk. Since exploitation requires administrator-level access, the threat is primarily from insider threats or attackers who have already compromised admin credentials. Successful exploitation could allow attackers to execute malicious scripts in the admin interface, potentially leading to session hijacking, unauthorized changes to site content or configuration, and lateral movement within the WordPress environment. This could disrupt business operations, damage reputation, and lead to data leakage. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if the vulnerability is exploited. Multisite WordPress installations, common in large organizations, are particularly at risk due to the disabling of 'unfiltered_html' capability, which this vulnerability bypasses. Although the vulnerability does not directly allow remote code execution or full site takeover without prior admin access, it lowers the security posture and could be leveraged as part of a multi-stage attack.
Mitigation Recommendations
European organizations should immediately verify if they use the Form Maker by 10Web plugin and identify the plugin version. If the version is prior to 1.15.33, they should prioritize updating to the latest version as soon as it becomes available. In the absence of an official patch, organizations can mitigate risk by restricting admin access strictly to trusted personnel, implementing strong multi-factor authentication (MFA) for all admin accounts, and monitoring admin activities for suspicious behavior. Additionally, applying Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the plugin’s settings pages can provide temporary protection. Organizations should also audit their multisite WordPress configurations to ensure that capability restrictions are properly enforced and consider additional input validation or sanitization plugins as a defense-in-depth measure. Regular security training for administrators on safe plugin management and recognizing phishing or credential compromise attempts will reduce the risk of initial admin account takeover.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-12-30T18:42:51.341Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec208
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 7:40:52 AM
Last updated: 11/22/2025, 4:41:44 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.