| 插件名称 | 10Web 的 WordPress 表单生成器 |
|---|---|
| 漏洞类型 | 跨站脚本攻击 |
| CVE 编号 | CVE-2026-1065 |
| 紧急程度 | 中等 |
| CVE 发布日期 | 2026-02-08 |
| 来源网址 | CVE-2026-1065 |
10Web 的表单生成器中的跨站脚本攻击 (CVE-2026-1065) — WordPress 网站所有者现在必须采取的措施
通过 SVG 上传的未经身份验证的存储型 XSS 在表单生成器中 (<=1.15.35) 被发布为 CVE-2026-1065。本文解释了风险、攻击者如何滥用 SVG 上传处理、如何检测利用,以及详细的缓解和恢复检查清单。.
为什么这个漏洞很重要
存储型跨站脚本攻击(XSS)是一种高影响的客户端漏洞。在这种情况下,未经身份验证的攻击者可以上传精心制作的SVG文件,这些文件会在网站上持久存在,并在访客的浏览器中渲染时执行JavaScript。由于该漏洞是未经身份验证的,攻击者不需要用户账户——只需能够访问易受攻击的上传端点。.
潜在后果包括:
- 盗取经过身份验证的 cookies 和会话令牌(导致权限提升);;
- 如果管理员查看感染页面,则会静默接管管理员帐户;;
- 持久性内容注入(网络钓鱼、篡改、广告插入);;
- 向网站访客分发驱动式恶意软件;;
- 从用户的浏览器中提取可访问的数据(表单输入、联系数据);;
- 声誉损害和 SEO 处罚。.
SVG 是 XML,可能包含 tags or event attributes such as onload. If upload handling only checks file extension or MIME type, malicious SVGs can bypass weak checks and run in your origin’s context.
Technical overview (non‑exploit)
Form Maker by 10Web versions up to and including 1.15.35 allow unauthenticated upload and storage of SVG files containing executable JavaScript. When those files are later served or embedded from your origin, the embedded script executes in the visitor’s browser. The issue is tracked as CVE‑2026‑1065 and has a CVSS v3.1 score of 7.1.
Why SVG is special
- SVGs are XML documents and can include script tags and event attributes (onload, onerror, etc.).
- Browsers render SVGs inline; inline JavaScript executes with the page’s origin.
- Some upload handlers only validate extension/MIME type and not actual content.
- A malicious SVG served from your domain can access cookies and the DOM for that origin.
We will not reproduce exploit code here. The guidance below focuses on safe detection, mitigation and recovery.
How attackers can abuse SVG uploads
High‑level attack flow
- Attacker locates an upload endpoint in Form Maker (or a form field) that accepts SVG files.
- They craft an SVG containing JavaScript or an event handler (for example, an
onloadattribute) that performs malicious actions when executed. - The crafted SVG is uploaded and stored on the site (commonly in
/wp-content/uploads/). - The attacker triggers visits to pages embedding or linking to that SVG, or waits for normal visitors/admins to load pages where the SVG is accessible.
- When a browser loads the SVG from your origin, the embedded script runs in that browser context with access to site cookies and DOM.
Common attacker objectives include cookie theft, content injection (phishing), admin takeover, pivoting to server‑side compromise, and data exfiltration.
Who is impacted
- Any WordPress site running Form Maker by 10Web at version 1.15.35 or earlier.
- Sites that allow uploaded SVGs to be served or rendered from the same origin.
- Administrators and site managers who might view infected pages.
- Visitors whose browsers may execute inline SVG scripts.
If you’re unsure which version you run, check Plugins > Installed Plugins in WP‑Admin or inspect wp-content/plugins/form-maker.
Detection: look for signs of exploitation
Perform these checks immediately — they help determine whether the vulnerability has been exploited.
1. Search uploads for recent SVGs
- Inspect
/wp-content/uploads/and other upload directories for.svgfiles added during the exposure window. - Look for unusual filenames or files uploaded by anonymous sources.