Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1058: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 10web Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder

0
High
VulnerabilityCVE-2026-1058cvecve-2026-1058cwe-79
Published: Tue Feb 03 2026 (02/03/2026, 06:38:05 UTC)
Source: CVE Database V5
Vendor/Project: 10web
Product: Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder

Description

The Form Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via hidden field values in all versions up to, and including, 1.15.35. This is due to insufficient output escaping when displaying hidden field values in the admin submissions list. The plugin uses html_entity_decode() on user-supplied hidden field values without subsequent escaping before output, which converts HTML entity-encoded payloads back into executable JavaScript. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in the admin submissions view that will execute whenever an administrator accesses the submissions list.

AI-Powered Analysis

AILast updated: 02/03/2026, 06:59:52 UTC

Technical Analysis

CVE-2026-1058 is a stored cross-site scripting vulnerability affecting the 10Web Form Maker plugin for WordPress, up to and including version 1.15.35. The vulnerability stems from improper neutralization of input during web page generation, specifically in the admin submissions list where hidden field values are displayed. The plugin uses the PHP function html_entity_decode() on user-supplied hidden field values without applying proper output escaping afterward. This decoding converts HTML entity-encoded payloads back into executable JavaScript code. As a result, an unauthenticated attacker can inject malicious scripts into hidden form fields that are stored and later executed in the context of the administrator’s browser when they access the submissions list. This stored XSS can lead to session hijacking, privilege escalation, or further attacks on the administrative interface. The vulnerability is rated high severity with a CVSS 3.1 score of 7.1, reflecting its network attack vector, low attack complexity, no privileges required, but requiring user interaction (admin viewing submissions). The scope is changed (S:C) because the attack affects the confidentiality, integrity, and availability of the admin interface. No patches were linked at the time of publication, and no known exploits have been reported in the wild. The vulnerability highlights a common security flaw in WordPress plugins where insufficient output sanitization allows persistent script injection in administrative views.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of WordPress-based websites that utilize the 10Web Form Maker plugin. Successful exploitation can lead to compromise of administrator sessions, unauthorized access to sensitive submission data, and potential site defacement or further malware injection. This can result in data breaches, loss of customer trust, regulatory non-compliance (e.g., GDPR violations), and operational disruption. Since the attack requires an administrator to view the malicious submission, organizations with high administrative activity or multiple administrators are at greater risk. The vulnerability could also be leveraged as a foothold for lateral movement within the network or to escalate privileges. Given the widespread use of WordPress in Europe and the popularity of form builder plugins, the impact could be broad, affecting sectors such as e-commerce, government, education, and healthcare.

Mitigation Recommendations

1. Immediately monitor and restrict administrative access to the WordPress backend, especially the submissions list of the 10Web Form Maker plugin, until a patch is available. 2. Apply strict input validation and output escaping on all hidden field values before rendering them in the admin interface. Use secure coding practices such as htmlspecialchars() or equivalent escaping functions after html_entity_decode() to neutralize scripts. 3. Limit the number of administrators who can access the submissions list and enforce multi-factor authentication (MFA) to reduce risk from compromised accounts. 4. Regularly audit plugin versions and update to the latest patched releases once available from 10Web. 5. Employ Web Application Firewalls (WAF) with custom rules to detect and block suspicious payloads targeting hidden fields in form submissions. 6. Educate administrators on the risks of XSS and encourage cautious behavior when reviewing form submissions. 7. Conduct regular security assessments and penetration testing focused on WordPress plugins and administrative interfaces to detect similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-16T18:20:44.141Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69819975f9fa50a62faa53b6

Added to database: 2/3/2026, 6:45:09 AM

Last enriched: 2/3/2026, 6:59:52 AM

Last updated: 2/3/2026, 8:50:42 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats