Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1261: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Wpmet MetForm Pro

0
High
VulnerabilityCVE-2026-1261cvecve-2026-1261cwe-79
Published: Tue Mar 10 2026 (03/10/2026, 09:25:30 UTC)
Source: CVE Database V5
Vendor/Project: Wpmet
Product: MetForm Pro

Description

CVE-2026-1261 is a high-severity stored Cross-Site Scripting (XSS) vulnerability affecting all versions of the MetForm Pro WordPress plugin up to 3. 9. 6. The flaw exists in the Quiz feature due to improper input sanitization and output escaping, allowing unauthenticated attackers to inject malicious scripts. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability requires no authentication or user interaction to exploit and affects the confidentiality and integrity of user data. Although no known exploits are currently in the wild, the vulnerability's public disclosure necessitates immediate attention. Organizations using MetForm Pro should prioritize patching once available and implement compensating controls to mitigate risk. The threat primarily impacts websites running WordPress with this plugin, which are widespread globally, especially in countries with high WordPress adoption. Due to the ease of exploitation and potential for widespread impact, this vulnerability is rated as high severity with a CVSS score of 7.

AI-Powered Analysis

AILast updated: 03/10/2026, 10:03:38 UTC

Technical Analysis

CVE-2026-1261 is a stored Cross-Site Scripting (XSS) vulnerability identified in the MetForm Pro plugin for WordPress, specifically affecting the Quiz feature in all versions up to 3.9.6. The root cause is insufficient sanitization of user input and lack of proper output escaping when rendering quiz content on web pages. This allows unauthenticated attackers to inject arbitrary JavaScript code that is stored persistently and executed in the context of any user visiting the affected page. The vulnerability does not require any privileges or user interaction, making it highly accessible for exploitation. The impact includes potential theft of cookies or session tokens, defacement of website content, phishing attacks, and unauthorized actions performed on behalf of users. The vulnerability has been assigned a CVSS v3.1 score of 7.2, reflecting its network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change due to affecting other users. While no public exploits have been reported yet, the widespread use of WordPress and MetForm Pro increases the risk of exploitation. The vulnerability was reserved on January 20, 2026, and published on March 10, 2026, by Wordfence. No official patches are currently linked, indicating users must monitor vendor updates closely. The CWE classification is CWE-79, which covers improper neutralization of input during web page generation leading to XSS.

Potential Impact

The vulnerability enables attackers to execute arbitrary JavaScript in the browsers of users visiting compromised pages, risking the confidentiality and integrity of user data. This can lead to session hijacking, credential theft, unauthorized actions, and phishing attacks. The persistent nature of stored XSS means the malicious payload remains active until removed, potentially affecting all visitors. For organizations, this can result in reputational damage, loss of customer trust, and regulatory penalties if user data is compromised. Since the attack requires no authentication or user interaction, it can be exploited at scale by automated tools. The scope of impact extends to all websites using the vulnerable MetForm Pro plugin, which is popular among WordPress users globally. The availability of the website is not directly affected, but indirect impacts such as blacklisting by search engines or browsers may occur. The vulnerability's exploitation could also serve as a foothold for further attacks within the victim's network.

Mitigation Recommendations

1. Immediately monitor for updates from the Wpmet vendor and apply patches as soon as they are released. 2. Until patches are available, disable or restrict access to the Quiz feature in MetForm Pro to prevent exploitation. 3. Implement a Web Application Firewall (WAF) with rules to detect and block malicious input patterns targeting the Quiz feature. 4. Conduct a thorough audit of all user-generated content in the Quiz feature and sanitize or remove suspicious entries. 5. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. 6. Educate site administrators on the risks of XSS and encourage regular security reviews of plugins and themes. 7. Use security plugins that provide real-time monitoring and alerting for suspicious activities related to XSS. 8. Regularly backup website data to enable quick restoration if compromise occurs. 9. Limit user permissions to reduce the risk of unauthorized content injection. 10. Consider isolating critical user sessions with additional authentication or multi-factor authentication to mitigate session hijacking risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-20T20:49:36.993Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69afe91aea502d3aa834a951

Added to database: 3/10/2026, 9:49:14 AM

Last enriched: 3/10/2026, 10:03:38 AM

Last updated: 3/10/2026, 11:01:57 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses