Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0633: CWE-287 Improper Authentication in roxnor MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor

0
Low
VulnerabilityCVE-2026-0633cvecve-2026-0633cwe-287
Published: Sat Jan 24 2026 (01/24/2026, 08:26:35 UTC)
Source: CVE Database V5
Vendor/Project: roxnor
Product: MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor

Description

The MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.1.0. This is due to the use of a forgeable cookie value derived only from the entry ID and current user ID without a server-side secret. This makes it possible for unauthenticated attackers to access form submission entry data via MetForm shortcodes for entries created within the transient TTL (default is 15 minutes).

AI-Powered Analysis

AILast updated: 02/01/2026, 08:30:44 UTC

Technical Analysis

CVE-2026-0633 is a vulnerability classified under CWE-287 (Improper Authentication) affecting the MetForm – Contact Form, Survey, Quiz, & Custom Form Builder plugin for Elementor on WordPress. The vulnerability exists in all versions up to and including 4.1.0 due to the use of a forgeable cookie value that is generated solely from the entry ID and current user ID without incorporating any server-side secret or cryptographic validation. This design flaw allows an unauthenticated attacker to craft a cookie that grants access to form submission entries via MetForm shortcodes. The exposure window is limited to the transient TTL, which defaults to 15 minutes, meaning the attacker can only access recent form submissions. The vulnerability impacts confidentiality by exposing sensitive user-submitted data but does not affect data integrity or system availability. The CVSS v3.1 score is 3.7, reflecting low severity due to the network attack vector, high attack complexity, no privileges required, no user interaction, and limited impact scope. No known exploits have been reported in the wild, and no official patches or mitigation links have been published at this time. The issue was reserved and published in January 2026 by Wordfence. The root cause is the lack of a server-side secret in cookie generation, which violates secure authentication practices and allows cookie forgery and unauthorized data access.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive information exposure from form submissions collected via the MetForm plugin. Organizations handling personal data, customer feedback, or survey responses through WordPress sites using MetForm could inadvertently leak confidential information, potentially violating GDPR and other data protection regulations. Although the exposure window is limited to 15 minutes, attackers could automate attempts to access recent submissions, leading to data leakage. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. Organizations in sectors such as e-commerce, healthcare, education, and government that rely on WordPress forms for data collection are particularly at risk. The low severity score indicates that while the risk is not critical, it should not be ignored, especially given the regulatory implications of data exposure in Europe. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2026-0633, European organizations should first verify their MetForm plugin version and upgrade to a patched version once available. In the absence of an official patch, administrators can implement the following specific measures: (1) Restrict access to form entry data by limiting shortcode usage to authenticated users or trusted roles only, thereby reducing exposure to unauthenticated attackers. (2) Implement web application firewall (WAF) rules to detect and block suspicious cookie values or repeated access attempts to form entries. (3) Reduce the transient TTL for form entries to less than 15 minutes to minimize the exposure window. (4) Monitor logs for unusual access patterns to form submission endpoints. (5) Consider disabling or replacing the MetForm plugin with alternative form builders that follow secure authentication practices until a fix is released. (6) Educate site administrators on the risks of improper authentication and the importance of timely plugin updates. These targeted actions go beyond generic advice by focusing on access control, monitoring, and configuration adjustments specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-06T01:17:56.319Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6974846c4623b1157ca99ed5

Added to database: 1/24/2026, 8:35:56 AM

Last enriched: 2/1/2026, 8:30:44 AM

Last updated: 2/5/2026, 10:08:53 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats