CVE-2026-1065
Published: 03 February 2026
Summary
CVE-2026-1065 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Wordpress (inferred from references). Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.
Dangerous file uploads can be detonated in the chamber to determine malice before any production write or execution occurs.
Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.
Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS via malicious SVG upload directly enables exploitation of public-facing web app (T1190), JavaScript execution (T1059.007), browser session hijacking (T1185), and external defacement (T1491.002).
NVD Description
The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.15.35. This is due to the plugin's default file upload allowlist including SVG files combined with weak substring-based extension…
more
validation. This makes it possible for unauthenticated attackers to upload malicious SVG files containing JavaScript code that will execute when viewed by administrators or site visitors via file upload fields in forms granted they can submit forms.
Deeper analysisAI
CVE-2026-1065 is a stored cross-site scripting (XSS) vulnerability affecting the Form Maker by 10Web plugin for WordPress in all versions up to and including 1.15.35. The issue stems from the plugin's default file upload allowlist permitting SVG files alongside weak substring-based extension validation, enabling the upload of malicious SVG files embedding JavaScript code. This flaw is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) with a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).
Unauthenticated attackers can exploit this vulnerability by submitting forms with file upload fields, uploading SVG files containing executable JavaScript, provided they have access to submit such forms. When administrators or site visitors view the uploaded files, the embedded JavaScript executes in their browsers, potentially leading to session hijacking, defacement, or further compromise depending on the payload.
References include code locations in the plugin's form_maker.php and add_field.js files highlighting the validation weaknesses, a WordPress plugin repository changeset indicating a fix in the trunk (from revision 3440395 to 3447011), and a Wordfence threat intelligence advisory. Mitigation involves updating the plugin to a version beyond 1.15.35, where the allowlist and validation issues are addressed.
Details
- CWE(s)