CVE-2026-0633: CWE-287 Improper Authentication in roxnor MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor
The MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.1.0. This is due to the use of a forgeable cookie value derived only from the entry ID and current user ID without a server-side secret. This makes it possible for unauthenticated attackers to access form submission entry data via MetForm shortcodes for entries created within the transient TTL (default is 15 minutes).
AI Analysis
Technical Summary
CVE-2026-0633 is a vulnerability classified under CWE-287 (Improper Authentication) affecting the MetForm – Contact Form, Survey, Quiz, & Custom Form Builder plugin for Elementor on WordPress. The vulnerability exists in all versions up to and including 4.1.0 due to the use of a forgeable cookie value that is generated solely from the entry ID and current user ID without incorporating any server-side secret or cryptographic validation. This design flaw allows an unauthenticated attacker to craft a cookie that grants access to form submission entries via MetForm shortcodes. The exposure window is limited to the transient TTL, which defaults to 15 minutes, meaning the attacker can only access recent form submissions. The vulnerability impacts confidentiality by exposing sensitive user-submitted data but does not affect data integrity or system availability. The CVSS v3.1 score is 3.7, reflecting low severity due to the network attack vector, high attack complexity, no privileges required, no user interaction, and limited impact scope. No known exploits have been reported in the wild, and no official patches or mitigation links have been published at this time. The issue was reserved and published in January 2026 by Wordfence. The root cause is the lack of a server-side secret in cookie generation, which violates secure authentication practices and allows cookie forgery and unauthorized data access.
Potential Impact
For European organizations, this vulnerability poses a risk of sensitive information exposure from form submissions collected via the MetForm plugin. Organizations handling personal data, customer feedback, or survey responses through WordPress sites using MetForm could inadvertently leak confidential information, potentially violating GDPR and other data protection regulations. Although the exposure window is limited to 15 minutes, attackers could automate attempts to access recent submissions, leading to data leakage. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. Organizations in sectors such as e-commerce, healthcare, education, and government that rely on WordPress forms for data collection are particularly at risk. The low severity score indicates that while the risk is not critical, it should not be ignored, especially given the regulatory implications of data exposure in Europe. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
To mitigate CVE-2026-0633, European organizations should first verify their MetForm plugin version and upgrade to a patched version once available. In the absence of an official patch, administrators can implement the following specific measures: (1) Restrict access to form entry data by limiting shortcode usage to authenticated users or trusted roles only, thereby reducing exposure to unauthenticated attackers. (2) Implement web application firewall (WAF) rules to detect and block suspicious cookie values or repeated access attempts to form entries. (3) Reduce the transient TTL for form entries to less than 15 minutes to minimize the exposure window. (4) Monitor logs for unusual access patterns to form submission endpoints. (5) Consider disabling or replacing the MetForm plugin with alternative form builders that follow secure authentication practices until a fix is released. (6) Educate site administrators on the risks of improper authentication and the importance of timely plugin updates. These targeted actions go beyond generic advice by focusing on access control, monitoring, and configuration adjustments specific to this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2026-0633: CWE-287 Improper Authentication in roxnor MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor
Description
The MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.1.0. This is due to the use of a forgeable cookie value derived only from the entry ID and current user ID without a server-side secret. This makes it possible for unauthenticated attackers to access form submission entry data via MetForm shortcodes for entries created within the transient TTL (default is 15 minutes).
AI-Powered Analysis
Technical Analysis
CVE-2026-0633 is a vulnerability classified under CWE-287 (Improper Authentication) affecting the MetForm – Contact Form, Survey, Quiz, & Custom Form Builder plugin for Elementor on WordPress. The vulnerability exists in all versions up to and including 4.1.0 due to the use of a forgeable cookie value that is generated solely from the entry ID and current user ID without incorporating any server-side secret or cryptographic validation. This design flaw allows an unauthenticated attacker to craft a cookie that grants access to form submission entries via MetForm shortcodes. The exposure window is limited to the transient TTL, which defaults to 15 minutes, meaning the attacker can only access recent form submissions. The vulnerability impacts confidentiality by exposing sensitive user-submitted data but does not affect data integrity or system availability. The CVSS v3.1 score is 3.7, reflecting low severity due to the network attack vector, high attack complexity, no privileges required, no user interaction, and limited impact scope. No known exploits have been reported in the wild, and no official patches or mitigation links have been published at this time. The issue was reserved and published in January 2026 by Wordfence. The root cause is the lack of a server-side secret in cookie generation, which violates secure authentication practices and allows cookie forgery and unauthorized data access.
Potential Impact
For European organizations, this vulnerability poses a risk of sensitive information exposure from form submissions collected via the MetForm plugin. Organizations handling personal data, customer feedback, or survey responses through WordPress sites using MetForm could inadvertently leak confidential information, potentially violating GDPR and other data protection regulations. Although the exposure window is limited to 15 minutes, attackers could automate attempts to access recent submissions, leading to data leakage. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. Organizations in sectors such as e-commerce, healthcare, education, and government that rely on WordPress forms for data collection are particularly at risk. The low severity score indicates that while the risk is not critical, it should not be ignored, especially given the regulatory implications of data exposure in Europe. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
To mitigate CVE-2026-0633, European organizations should first verify their MetForm plugin version and upgrade to a patched version once available. In the absence of an official patch, administrators can implement the following specific measures: (1) Restrict access to form entry data by limiting shortcode usage to authenticated users or trusted roles only, thereby reducing exposure to unauthenticated attackers. (2) Implement web application firewall (WAF) rules to detect and block suspicious cookie values or repeated access attempts to form entries. (3) Reduce the transient TTL for form entries to less than 15 minutes to minimize the exposure window. (4) Monitor logs for unusual access patterns to form submission endpoints. (5) Consider disabling or replacing the MetForm plugin with alternative form builders that follow secure authentication practices until a fix is released. (6) Educate site administrators on the risks of improper authentication and the importance of timely plugin updates. These targeted actions go beyond generic advice by focusing on access control, monitoring, and configuration adjustments specific to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-06T01:17:56.319Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6974846c4623b1157ca99ed5
Added to database: 1/24/2026, 8:35:56 AM
Last enriched: 2/1/2026, 8:30:44 AM
Last updated: 2/5/2026, 10:08:53 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1654: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pkthree Peter’s Date Countdown
MediumCVE-2026-1294: CWE-918 Server-Side Request Forgery (SSRF) in bplugins All In One Image Viewer Block – Gutenberg block to create image viewer with hyperlink
HighCVE-2026-1271: CWE-639 Authorization Bypass Through User-Controlled Key in metagauss ProfileGrid – User Profiles, Groups and Communities
MediumCVE-2025-14079: CWE-862 Missing Authorization in elextensions ELEX WordPress HelpDesk & Customer Ticketing System
MediumMicrosoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.