CVE-2026-3330: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in 10web Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder
The Form Maker by 10Web plugin for WordPress is vulnerable to SQL Injection via the 'ip_search', 'startdate', 'enddate', 'username_search', and 'useremail_search' parameters in all versions up to, and including, 1.15.40. This is due to the `WDW_FM_Library::validate_data()` method calling `stripslashes()` on user input (removing WordPress's `wp_magic_quotes()` protection) and the `FMModelSubmissions_fm::get_labels_parameters()` function directly concatenating user-supplied values into SQL queries without using `$wpdb->prepare()`. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Additionally, the Submissions controller skips nonce verification for the `display` task, which means this vulnerability can be triggered via CSRF by tricking an administrator into clicking a crafted link.
AI Analysis
Technical Summary
CVE-2026-3330 is an SQL Injection vulnerability in the Form Maker by 10Web WordPress plugin affecting all versions up to 1.15.40. The issue arises because the `WDW_FM_Library::validate_data()` method removes WordPress's default magic quotes protection by calling `stripslashes()` on user input, and the `FMModelSubmissions_fm::get_labels_parameters()` function concatenates user input directly into SQL queries without using the `$wpdb->prepare()` method. This allows authenticated administrators to inject additional SQL commands via parameters such as 'ip_search', 'startdate', 'enddate', 'username_search', and 'useremail_search'. Additionally, the Submissions controller does not verify nonces for the 'display' task, enabling exploitation through CSRF by tricking an administrator into clicking a crafted link.
Potential Impact
An attacker with Administrator-level access can exploit this vulnerability to perform SQL Injection attacks, potentially extracting sensitive information from the database. The lack of nonce verification for a specific task also allows the vulnerability to be triggered via CSRF, increasing the attack surface. There is no indication of impact on data integrity or availability, and no known exploits in the wild have been reported.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict Administrator access to trusted users only and avoid clicking suspicious links that could trigger CSRF attacks. Monitor vendor channels for updates and apply patches promptly once released.
CVE-2026-3330: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in 10web Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder
Description
The Form Maker by 10Web plugin for WordPress is vulnerable to SQL Injection via the 'ip_search', 'startdate', 'enddate', 'username_search', and 'useremail_search' parameters in all versions up to, and including, 1.15.40. This is due to the `WDW_FM_Library::validate_data()` method calling `stripslashes()` on user input (removing WordPress's `wp_magic_quotes()` protection) and the `FMModelSubmissions_fm::get_labels_parameters()` function directly concatenating user-supplied values into SQL queries without using `$wpdb->prepare()`. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Additionally, the Submissions controller skips nonce verification for the `display` task, which means this vulnerability can be triggered via CSRF by tricking an administrator into clicking a crafted link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3330 is an SQL Injection vulnerability in the Form Maker by 10Web WordPress plugin affecting all versions up to 1.15.40. The issue arises because the `WDW_FM_Library::validate_data()` method removes WordPress's default magic quotes protection by calling `stripslashes()` on user input, and the `FMModelSubmissions_fm::get_labels_parameters()` function concatenates user input directly into SQL queries without using the `$wpdb->prepare()` method. This allows authenticated administrators to inject additional SQL commands via parameters such as 'ip_search', 'startdate', 'enddate', 'username_search', and 'useremail_search'. Additionally, the Submissions controller does not verify nonces for the 'display' task, enabling exploitation through CSRF by tricking an administrator into clicking a crafted link.
Potential Impact
An attacker with Administrator-level access can exploit this vulnerability to perform SQL Injection attacks, potentially extracting sensitive information from the database. The lack of nonce verification for a specific task also allows the vulnerability to be triggered via CSRF, increasing the attack surface. There is no indication of impact on data integrity or availability, and no known exploits in the wild have been reported.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict Administrator access to trusted users only and avoid clicking suspicious links that could trigger CSRF attacks. Monitor vendor channels for updates and apply patches promptly once released.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-27T14:37:55.825Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e1b7b882d89c981f6ce736
Added to database: 4/17/2026, 4:31:52 AM
Last enriched: 4/17/2026, 4:47:23 AM
Last updated: 4/17/2026, 6:23:36 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.