<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>10Web — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/10web/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 22 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/10web/feed.xml" rel="self" type="application/rss+xml"/><item><title>SQL Injection Vulnerability in Form Maker by 10Web WordPress Plugin</title><link>https://feed.craftedsignal.io/briefs/2024-01-form-maker-sqli/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-form-maker-sqli/</guid><description>The Form Maker by 10Web WordPress plugin is vulnerable to SQL Injection via the 'inputs' parameter in versions up to 1.15.42, allowing unauthenticated attackers to extract sensitive information from the database.</description><content:encoded><![CDATA[<p>The Form Maker by 10Web plugin, a WordPress plugin designed for creating mobile-friendly contact forms, is susceptible to SQL Injection attacks. This vulnerability, identified as CVE-2026-3359, affects versions up to and including 1.15.42. The root cause lies in the insufficient escaping of user-supplied input via the &lsquo;inputs&rsquo; parameter and the lack of adequate preparation in the existing SQL query. This flaw enables unauthenticated attackers to inject malicious SQL queries, potentially leading to the extraction of sensitive data from the WordPress database. Successful exploitation allows unauthorized access to potentially sensitive information, impacting the confidentiality of the WordPress site&rsquo;s data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version (&lt;= 1.15.42) of the Form Maker by 10Web plugin.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the &lsquo;inputs&rsquo; parameter.</li>
<li>The crafted request includes a SQL injection payload within the &lsquo;inputs&rsquo; parameter, designed to bypass input validation.</li>
<li>The WordPress application processes the HTTP request, and the injected SQL code is passed to the database server without proper sanitization.</li>
<li>The database server executes the attacker-supplied SQL code along with the intended query, leading to unintended database operations.</li>
<li>The attacker-controlled SQL query extracts sensitive information, such as user credentials, database structure, or other confidential data.</li>
<li>The extracted data is returned to the attacker as part of the HTTP response, or potentially stored elsewhere for later retrieval.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL Injection vulnerability can lead to the unauthorized disclosure of sensitive information stored in the WordPress database. This could include user credentials, personal data, or other confidential business information. The impact includes potential data breaches, reputational damage, and legal repercussions. While specific victim counts are unavailable, any WordPress site running a vulnerable version of the plugin is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Form Maker by 10Web plugin to the latest version to remediate CVE-2026-3359.</li>
<li>Deploy the Sigma rule &ldquo;Detect Form Maker SQL Injection Attempt&rdquo; to your SIEM to detect potential exploitation attempts targeting the &lsquo;inputs&rsquo; parameter.</li>
<li>Monitor web server logs for suspicious requests containing SQL syntax within the &lsquo;inputs&rsquo; parameter to identify and block malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin</category></item></channel></rss>