Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 17 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
10web
10web form Maker By 10web – Mobile-friendly Drag & Drop Contact Form Builder Wordpress Wordpress wordpress |
|
| Vendors & Products |
10web
10web form Maker By 10web – Mobile-friendly Drag & Drop Contact Form Builder Wordpress Wordpress wordpress |
Fri, 17 Apr 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Form Maker by 10Web plugin for WordPress is vulnerable to SQL Injection via the 'ip_search', 'startdate', 'enddate', 'username_search', and 'useremail_search' parameters in all versions up to, and including, 1.15.40. This is due to the `WDW_FM_Library::validate_data()` method calling `stripslashes()` on user input (removing WordPress's `wp_magic_quotes()` protection) and the `FMModelSubmissions_fm::get_labels_parameters()` function directly concatenating user-supplied values into SQL queries without using `$wpdb->prepare()`. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Additionally, the Submissions controller skips nonce verification for the `display` task, which means this vulnerability can be triggered via CSRF by tricking an administrator into clicking a crafted link. | |
| Title | Form Maker by 10Web <= 1.15.40 - Authenticated (Administrator+) SQL Injection via 'ip_search' Parameter | |
| Weaknesses | CWE-89 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-17T11:15:39.808Z
Reserved: 2026-02-27T14:37:55.825Z
Link: CVE-2026-3330
Updated: 2026-04-17T11:15:33.371Z
Status : Received
Published: 2026-04-17T05:16:18.080
Modified: 2026-04-17T05:16:18.080
Link: CVE-2026-3330
No data.
OpenCVE Enrichment
Updated: 2026-04-17T08:01:14Z