Cyber Posture

CVE-2026-1065

High

Published: 03 February 2026

Published
03 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0002 6.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-1065 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Wordpress (inferred from references). Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 3 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-434

Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.

addresses: CWE-434

Dangerous file uploads can be detonated in the chamber to determine malice before any production write or execution occurs.

addresses: CWE-434

Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.

addresses: CWE-434

Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1491.002 External Defacement Impact
An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users.
Why these techniques?

Stored XSS via malicious SVG upload directly enables exploitation of public-facing web app (T1190), JavaScript execution (T1059.007), browser session hijacking (T1185), and external defacement (T1491.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.15.35. This is due to the plugin's default file upload allowlist including SVG files combined with weak substring-based extension…

more

validation. This makes it possible for unauthenticated attackers to upload malicious SVG files containing JavaScript code that will execute when viewed by administrators or site visitors via file upload fields in forms granted they can submit forms.

Deeper analysisAI

CVE-2026-1065 is a stored cross-site scripting (XSS) vulnerability affecting the Form Maker by 10Web plugin for WordPress in all versions up to and including 1.15.35. The issue stems from the plugin's default file upload allowlist permitting SVG files alongside weak substring-based extension validation, enabling the upload of malicious SVG files embedding JavaScript code. This flaw is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) with a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).

Unauthenticated attackers can exploit this vulnerability by submitting forms with file upload fields, uploading SVG files containing executable JavaScript, provided they have access to submit such forms. When administrators or site visitors view the uploaded files, the embedded JavaScript executes in their browsers, potentially leading to session hijacking, defacement, or further compromise depending on the payload.

References include code locations in the plugin's form_maker.php and add_field.js files highlighting the validation weaknesses, a WordPress plugin repository changeset indicating a fix in the trunk (from revision 3440395 to 3447011), and a Wordfence threat intelligence advisory. Mitigation involves updating the plugin to a version beyond 1.15.35, where the allowlist and validation issues are addressed.

Details

CWE(s)

Affected Products

Wordpress
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-25200Shared CWE-434
CVE-2025-64095Shared CWE-434
CVE-2025-69771Shared CWE-434
CVE-2025-34299Shared CWE-434
CVE-2025-15158Shared CWE-434
CVE-2025-13156Shared CWE-434
CVE-2026-1358Shared CWE-434
CVE-2025-52691Shared CWE-434
CVE-2025-12974Shared CWE-434
CVE-2025-13069Shared CWE-434

References