Cyber Posture

CVE-2026-3359

High

Published: 05 May 2026

Published
05 May 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0007 20.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to SQL Injection via the 'inputs' parameter in versions up to, and including, 1.15.42 due to insufficient escaping on the user supplied…

more

parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-89

Penetration testing uses SQL injection payloads against database interfaces, identifying and supporting fixes for SQL injection weaknesses.

addresses: CWE-89

Validates query inputs to prevent SQL syntax or command manipulation.

Security SummaryAI

CVE-2026-3359 is a SQL injection vulnerability (CWE-89) affecting the Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress in versions up to and including 1.15.42. The issue stems from insufficient escaping of the user-supplied 'inputs' parameter and lack of sufficient preparation in the existing SQL query, enabling attackers to append additional SQL queries to extract sensitive information from the database. The vulnerability was published on 2026-05-05 and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. By crafting malicious requests targeting the 'inputs' parameter, they can inject SQL payloads into existing queries, achieving high-impact confidentiality violations such as dumping sensitive database contents, including user data or other site information.

Advisories and patches reference mitigation through a fix in WordPress plugins trac changeset 3518461 (https://plugins.trac.wordpress.org/changeset/3518461/form-maker). Wordfence provides further threat intelligence details at https://www.wordfence.com/threat-intel/vulnerabilities/id/f37cc880-d8a4-431a-9639-abf01163030a?source=cve, recommending updates to patched versions.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in public-facing WordPress plugin enables remote unauthenticated exploitation for database data access (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References