CVE-2026-1058
📋 TL;DR
The Form Maker WordPress plugin has a stored XSS vulnerability in versions up to 1.15.35. Unauthenticated attackers can inject malicious JavaScript into hidden form fields, which executes when WordPress administrators view form submissions in the admin panel. This affects all WordPress sites using vulnerable versions of the Form Maker plugin.
💻 Affected Systems
- Form Maker WordPress Plugin
⚠️ Risk & Real-World Impact
Worst Case
Attackers could compromise administrator accounts, install backdoors, steal sensitive data, or take full control of the WordPress site.
Likely Case
Attackers inject malicious scripts to steal administrator session cookies or credentials, leading to site compromise.
If Mitigated
With proper output escaping and input validation, the malicious scripts would be rendered harmless as text rather than executed.
🎯 Exploit Status
The vulnerability is well-documented with public proof-of-concept references. Attackers can exploit it by submitting forms with malicious hidden field values.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.15.36 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Form Maker plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.15.36+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable Form Maker Plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate form-maker
Restrict Admin Access
allLimit access to the WordPress admin panel to trusted IP addresses only.
🧯 If You Can't Patch
- Remove or disable the Form Maker plugin entirely
- Implement a web application firewall (WAF) with XSS protection rules
🔍 How to Verify
Check if Vulnerable:
Check the Form Maker plugin version in WordPress admin under Plugins → Installed Plugins. If version is 1.15.35 or lower, you are vulnerable.
Check Version:
wp plugin get form-maker --field=version
Verify Fix Applied:
After updating, verify the plugin version is 1.15.36 or higher in the WordPress plugins list.
📡 Detection & Monitoring
Log Indicators:
- Unusual form submissions with encoded HTML/JavaScript in hidden fields
- Multiple form submissions from same IP with varying payloads
Network Indicators:
- HTTP POST requests to form submission endpoints containing encoded script tags
SIEM Query:
source="wordpress.log" AND "form-maker" AND ("hidden" OR "script" OR "javascript")
🔗 References
- https://plugins.trac.wordpress.org/browser/form-maker/tags/1.15.34/admin/views/Submissions_fm.php#L759
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3447011%40form-maker%2Ftrunk&old=3440395%40form-maker%2Ftrunk&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e0ec0027-2792-4069-b413-8fdd951f5fe7?source=cve