CVE-2024-8633: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 10web Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder
CVE-2024-8633 is a stored cross-site scripting (XSS) vulnerability in the Form Maker by 10Web WordPress plugin, affecting all versions up to 1. 15. 27. It allows authenticated users with Administrator-level privileges or higher to inject malicious scripts into pages generated by the plugin. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability arises from insufficient input sanitization and output escaping during web page generation. Exploitation does not require user interaction but does require high-level privileges. The CVSS score is 5. 5 (medium severity), reflecting the need for authentication and limited impact on availability. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2024-8633 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress. This vulnerability affects all versions up to and including 1.15.27. The root cause is insufficient sanitization of user input and inadequate escaping of output during the generation of web pages by the plugin. An attacker with authenticated Administrator-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into form fields or other input areas managed by the plugin. Once injected, the malicious script is stored persistently and executed in the context of any user who views the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability requires no user interaction beyond visiting the injected page but does require high privilege levels for injection, limiting the attack vector primarily to insiders or compromised admin accounts. The CVSS v3.1 base score is 5.5, indicating medium severity, with an attack vector of network, low attack complexity, high privileges required, no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. No public exploit code or active exploitation has been reported as of the publication date. The vulnerability highlights the importance of proper input validation and output encoding in WordPress plugins, especially those handling user-generated content.
Potential Impact
The primary impact of CVE-2024-8633 is the potential compromise of user confidentiality and integrity within affected WordPress sites using the Form Maker by 10Web plugin. An attacker with Administrator privileges can inject malicious scripts that execute in the browsers of users visiting the compromised pages. This can lead to session hijacking, theft of sensitive information such as cookies or credentials, unauthorized actions performed on behalf of users, and defacement or manipulation of website content. Although the vulnerability does not affect availability, the reputational damage and potential data breaches can be significant. Organizations relying on this plugin risk insider threats or attackers who have gained admin access exploiting this vulnerability to escalate their foothold or move laterally. Since WordPress powers a large portion of websites globally, including business, government, and e-commerce sites, the scope of impact can be broad. However, the requirement for high privileges to exploit reduces the likelihood of external attackers without credentials leveraging this flaw. Still, compromised admin accounts or malicious insiders represent a critical risk vector. Failure to address this vulnerability could lead to regulatory compliance issues if user data is exposed or manipulated.
Mitigation Recommendations
To mitigate CVE-2024-8633, organizations should immediately upgrade the Form Maker by 10Web plugin to a version that addresses this vulnerability once released by the vendor. In the absence of an official patch, administrators should restrict plugin access strictly to trusted personnel and monitor admin accounts for suspicious activity. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injection patterns in form inputs can provide temporary protection. Conduct thorough input validation and output encoding on all user-supplied data within the plugin’s forms if custom modifications are possible. Regularly audit and review user roles and permissions to minimize the number of users with Administrator-level access. Employ multi-factor authentication (MFA) for all admin accounts to reduce the risk of credential compromise. Additionally, monitor website logs for unusual behavior indicative of XSS exploitation attempts. Educate site administrators about the risks of stored XSS and the importance of applying security updates promptly. Finally, consider isolating critical WordPress instances or using security plugins that can detect and remediate XSS payloads.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2024-8633: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 10web Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder
Description
CVE-2024-8633 is a stored cross-site scripting (XSS) vulnerability in the Form Maker by 10Web WordPress plugin, affecting all versions up to 1. 15. 27. It allows authenticated users with Administrator-level privileges or higher to inject malicious scripts into pages generated by the plugin. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability arises from insufficient input sanitization and output escaping during web page generation. Exploitation does not require user interaction but does require high-level privileges. The CVSS score is 5. 5 (medium severity), reflecting the need for authentication and limited impact on availability. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2024-8633 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress. This vulnerability affects all versions up to and including 1.15.27. The root cause is insufficient sanitization of user input and inadequate escaping of output during the generation of web pages by the plugin. An attacker with authenticated Administrator-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into form fields or other input areas managed by the plugin. Once injected, the malicious script is stored persistently and executed in the context of any user who views the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability requires no user interaction beyond visiting the injected page but does require high privilege levels for injection, limiting the attack vector primarily to insiders or compromised admin accounts. The CVSS v3.1 base score is 5.5, indicating medium severity, with an attack vector of network, low attack complexity, high privileges required, no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. No public exploit code or active exploitation has been reported as of the publication date. The vulnerability highlights the importance of proper input validation and output encoding in WordPress plugins, especially those handling user-generated content.
Potential Impact
The primary impact of CVE-2024-8633 is the potential compromise of user confidentiality and integrity within affected WordPress sites using the Form Maker by 10Web plugin. An attacker with Administrator privileges can inject malicious scripts that execute in the browsers of users visiting the compromised pages. This can lead to session hijacking, theft of sensitive information such as cookies or credentials, unauthorized actions performed on behalf of users, and defacement or manipulation of website content. Although the vulnerability does not affect availability, the reputational damage and potential data breaches can be significant. Organizations relying on this plugin risk insider threats or attackers who have gained admin access exploiting this vulnerability to escalate their foothold or move laterally. Since WordPress powers a large portion of websites globally, including business, government, and e-commerce sites, the scope of impact can be broad. However, the requirement for high privileges to exploit reduces the likelihood of external attackers without credentials leveraging this flaw. Still, compromised admin accounts or malicious insiders represent a critical risk vector. Failure to address this vulnerability could lead to regulatory compliance issues if user data is exposed or manipulated.
Mitigation Recommendations
To mitigate CVE-2024-8633, organizations should immediately upgrade the Form Maker by 10Web plugin to a version that addresses this vulnerability once released by the vendor. In the absence of an official patch, administrators should restrict plugin access strictly to trusted personnel and monitor admin accounts for suspicious activity. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injection patterns in form inputs can provide temporary protection. Conduct thorough input validation and output encoding on all user-supplied data within the plugin’s forms if custom modifications are possible. Regularly audit and review user roles and permissions to minimize the number of users with Administrator-level access. Employ multi-factor authentication (MFA) for all admin accounts to reduce the risk of credential compromise. Additionally, monitor website logs for unusual behavior indicative of XSS exploitation attempts. Educate site administrators about the risks of stored XSS and the importance of applying security updates promptly. Finally, consider isolating critical WordPress instances or using security plugins that can detect and remediate XSS payloads.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-09-09T21:45:49.230Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c2eb7ef31ef0b560d90
Added to database: 2/25/2026, 9:39:58 PM
Last enriched: 2/26/2026, 4:07:15 AM
Last updated: 2/26/2026, 9:43:58 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.