Vulnerability Description
The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Matrix field (Text Box input type) in form submissions in all versions up to, and including, 1.15.40. This is due to insufficient input sanitization (`sanitize_text_field` strips tags but not quotes) and missing output escaping when rendering submission data in the admin Submissions view. This makes it possible for unauthenticated attackers to inject arbitrary JavaScript through a form submission that executes in the browser of an administrator who views the submission details.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/form-maker/tags/1.15.37/admin/views/F
- https://plugins.trac.wordpress.org/browser/form-maker/tags/1.15.37/admin/views/F
- https://plugins.trac.wordpress.org/browser/form-maker/tags/1.15.37/frontend/mode
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new
- https://www.wordfence.com/threat-intel/vulnerabilities/id/197449f5-9304-49df-926
FAQ
What is CVE-2026-4388?
CVE-2026-4388 is a vulnerability with a CVSS score of 7.2 (HIGH). The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Matrix field (Text Box input type) in form submissions in all versions up to, and including, 1.15.40. ...
How severe is CVE-2026-4388?
CVE-2026-4388 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-4388?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.