Form Maker by 10Web is a popular WordPress plugin designed to simplify the process of creating and managing forms. With over 50,000 active installations, it provides a versatile and user-friendly interface for adding various types of forms to WordPress websites. However, a critical vulnerability, CVE-2024-10680, has been discovered in the plugin that allows attackers to exploit stored Cross-Site Scripting (XSS). This vulnerability enables attackers to inject malicious scripts, potentially giving them access to admin accounts and creating backdoors in the system.

CVECVE-2024-10680
Form Maker by 10Web < 1.15.32
CriticalHigh
All Time4 630 195
Active installations50 000+
Publicly PublishedApril 22, 2025
Last UpdatedApril 22, 2025
ResearcherDmitrii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10680
https://wpscan.com/vulnerability/240948d7-ece0-437f-b926-62937bdbd9db/
Plugin Security Certification by CleanTalk
Logo of the plugin

Join the community of developers who prioritize security. Highlight your plugin in the WordPress catalog.

PSC by Cleantalk

Timeline

October 15, 2024Plugin testing and vulnerability detection in the Form Maker by 10Web have been completed
October 15, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
April 22, 2025Registered CVE-2024-10680

Discovery of the Vulnerability

The vulnerability was discovered during a routine security test of the Form Maker plugin. It was found that the plugin fails to properly sanitize user input in the HTML field, particularly the “Image” field within the HTML section. When users can add custom HTML code to their forms without proper input sanitization, they are vulnerable to the injection of malicious JavaScript. This flaw can be exploited by users with editor-level access, enabling them to escalate their privileges and potentially compromise the entire WordPress site.

Understanding of XSS attack’s

Cross-Site Scripting (XSS) is one of the most common and severe vulnerabilities in web applications. It allows attackers to inject malicious scripts into web pages viewed by other users. These scripts are then executed in the context of the victim’s browser, enabling attackers to steal session cookies, hijack user accounts, or escalate privileges. In WordPress, XSS vulnerabilities are especially problematic because they can be easily exploited by users with lower roles, like contributors or editors. Real-world examples include attackers using XSS to inject scripts that modify website content, steal user data, or launch phishing attacks. In the case of CVE-2024-10680, the attack allows for privilege escalation from editor-level users to admin-level users, posing a significant threat to the website’s security.

Exploiting the XSS Vulnerability

To exploit CVE-2024-10680, an attacker with editor+ privileges:

POC:

Create a new form by Form Maker. You should add here new field "HTML" and change "Image" field in "HTML" section to "Malicious JS code eval() and etc. For example <img src="x" onmouseover="alert(1)//" "=""> -> Save Settings (Admins and editors are allowed to use JS in posts/pages/comments/etc, so the unfiltered_html capability should be disallowed when testing for Stored XSS using such roles)

____

The risk posed by CVE-2024-10680 is significant, particularly for websites that rely on Form Maker for user-generated forms. If exploited, an attacker can gain full control over the website by hijacking the admin’s session or escalating privileges. In a real-world scenario, this could lead to the attacker modifying site settings, stealing sensitive data, injecting malware, or even defacing the website. E-commerce websites or platforms that handle sensitive user data would be particularly vulnerable, as attackers could use this vulnerability to gain access to customer information, payment details, and other confidential data. The backdoor created by the attacker could be used for long-term access, making it difficult to detect and remediate.

Recommendations for Improved Security

To mitigate the risk of CVE-2024-10680, users should immediately update the Form Maker plugin to the latest version, which includes a fix for this XSS vulnerability. Developers should ensure that all input fields in the plugin, especially those that accept HTML, are properly sanitized using WordPress’s built-in functions such as esc_html() or wp_kses(). Additionally, administrators should limit the roles of users who can access sensitive plugin settings and regularly audit their plugins for security vulnerabilities. Implementing a Content Security Policy (CSP) and using a Web Application Firewall (WAF) can also help to prevent malicious scripts from executing in the first place. To prevent this type of attacks vendor used our methods of prevention.

By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-10680, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

Dmitrii I.
CVE-2024-10680 – Form Maker by 10Web – Stored XSS to JS Backdoor Creation – POC

Leave a Reply

Your email address will not be published. Required fields are marked *