The MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.1.0. This is due to the use of a forgeable cookie value derived only from the entry ID and current user ID without a server-side secret. This makes it possible for unauthenticated attackers to access form submission entry data via MetForm shortcodes for entries created within the transient TTL (default is 15 minutes).
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Elementor
Elementor elementor
Roxnor
Roxnor metform Contact Form Survey Quiz Custom Form Builder For Elementor
Wordpress
Wordpress wordpress
Vendors & Products Elementor
Elementor elementor
Roxnor
Roxnor metform Contact Form Survey Quiz Custom Form Builder For Elementor
Wordpress
Wordpress wordpress

Sat, 24 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
Description The MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.1.0. This is due to the use of a forgeable cookie value derived only from the entry ID and current user ID without a server-side secret. This makes it possible for unauthenticated attackers to access form submission entry data via MetForm shortcodes for entries created within the transient TTL (default is 15 minutes).
Title MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor <= 4.1.0 - Unauthenticated Form Submission Exposure via Forgeable Cookie Value
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-01-26T17:47:55.740Z

Reserved: 2026-01-06T01:17:56.319Z

Link: CVE-2026-0633

cve-icon Vulnrichment

Updated: 2026-01-26T17:47:52.431Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-24T09:15:52.843

Modified: 2026-01-26T15:03:33.357

Link: CVE-2026-0633

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-26T11:48:19Z

Weaknesses