CVE-2026-0753: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bitacre Super Simple Contact Form
The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sscf_name' parameter in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2026-0753 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Super Simple Contact Form plugin for WordPress, developed by bitacre. The vulnerability exists in all versions up to and including 1.6.2 due to insufficient sanitization and escaping of user-supplied input in the 'sscf_name' parameter. Reflected XSS occurs when malicious input is immediately returned in the HTTP response without proper neutralization, allowing attackers to inject arbitrary JavaScript code. Since the vulnerability is unauthenticated and exploitable remotely via crafted URLs, an attacker can lure victims into clicking malicious links that execute scripts in their browsers. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. The CVSS 3.1 base score of 7.2 indicates a high-severity issue with network attack vector, low attack complexity, no privileges required, and no user interaction beyond clicking a link. The scope is changed (S:C), meaning the vulnerability affects components beyond the vulnerable plugin itself, potentially impacting the entire WordPress site. No patches were linked at the time of disclosure, and no known exploits in the wild have been reported, but the vulnerability poses a significant risk given WordPress's widespread use. The CWE-79 classification highlights the root cause as improper neutralization of input during web page generation. The vulnerability's impact is primarily on confidentiality and integrity, with no direct availability impact. The plugin is commonly used to add simple contact forms to WordPress sites, making it a frequent target for attackers seeking to exploit XSS to compromise user sessions or steal data.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those relying on WordPress websites with the Super Simple Contact Form plugin installed. Exploitation can lead to unauthorized access to user sessions, theft of sensitive customer data, and potential defacement or redirection attacks that damage brand reputation. E-commerce sites, government portals, and service providers using this plugin are particularly vulnerable to customer data breaches and fraud. The reflected XSS can also be used as a vector for delivering further malware or phishing attacks, increasing the overall threat landscape. Given the high adoption of WordPress in Europe, the potential attack surface is large. The vulnerability's ability to be exploited without authentication and with minimal user interaction increases the likelihood of successful attacks. Additionally, the changed scope means that the impact can extend beyond the plugin to the entire website, potentially affecting backend systems or other integrated services. This can lead to regulatory compliance issues under GDPR if personal data is compromised, resulting in legal and financial consequences.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Super Simple Contact Form plugin and its version. Until an official patch is released, consider temporarily disabling or removing the plugin to eliminate the attack vector. Deploy Web Application Firewalls (WAFs) with specific rules to detect and block malicious payloads targeting the 'sscf_name' parameter. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected web pages. Educate users and staff about the risks of clicking unsolicited or suspicious links, especially those that may appear in emails or social media. Monitor web server logs for unusual requests containing suspicious parameters indicative of attempted exploitation. Once a patch is available, apply it promptly and verify the fix through testing. Additionally, consider employing security plugins that sanitize user inputs and outputs more robustly. Conduct regular security assessments and penetration tests focusing on XSS vulnerabilities to proactively identify and remediate similar issues.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-0753: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bitacre Super Simple Contact Form
Description
The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sscf_name' parameter in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2026-0753 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Super Simple Contact Form plugin for WordPress, developed by bitacre. The vulnerability exists in all versions up to and including 1.6.2 due to insufficient sanitization and escaping of user-supplied input in the 'sscf_name' parameter. Reflected XSS occurs when malicious input is immediately returned in the HTTP response without proper neutralization, allowing attackers to inject arbitrary JavaScript code. Since the vulnerability is unauthenticated and exploitable remotely via crafted URLs, an attacker can lure victims into clicking malicious links that execute scripts in their browsers. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. The CVSS 3.1 base score of 7.2 indicates a high-severity issue with network attack vector, low attack complexity, no privileges required, and no user interaction beyond clicking a link. The scope is changed (S:C), meaning the vulnerability affects components beyond the vulnerable plugin itself, potentially impacting the entire WordPress site. No patches were linked at the time of disclosure, and no known exploits in the wild have been reported, but the vulnerability poses a significant risk given WordPress's widespread use. The CWE-79 classification highlights the root cause as improper neutralization of input during web page generation. The vulnerability's impact is primarily on confidentiality and integrity, with no direct availability impact. The plugin is commonly used to add simple contact forms to WordPress sites, making it a frequent target for attackers seeking to exploit XSS to compromise user sessions or steal data.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those relying on WordPress websites with the Super Simple Contact Form plugin installed. Exploitation can lead to unauthorized access to user sessions, theft of sensitive customer data, and potential defacement or redirection attacks that damage brand reputation. E-commerce sites, government portals, and service providers using this plugin are particularly vulnerable to customer data breaches and fraud. The reflected XSS can also be used as a vector for delivering further malware or phishing attacks, increasing the overall threat landscape. Given the high adoption of WordPress in Europe, the potential attack surface is large. The vulnerability's ability to be exploited without authentication and with minimal user interaction increases the likelihood of successful attacks. Additionally, the changed scope means that the impact can extend beyond the plugin to the entire website, potentially affecting backend systems or other integrated services. This can lead to regulatory compliance issues under GDPR if personal data is compromised, resulting in legal and financial consequences.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Super Simple Contact Form plugin and its version. Until an official patch is released, consider temporarily disabling or removing the plugin to eliminate the attack vector. Deploy Web Application Firewalls (WAFs) with specific rules to detect and block malicious payloads targeting the 'sscf_name' parameter. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected web pages. Educate users and staff about the risks of clicking unsolicited or suspicious links, especially those that may appear in emails or social media. Monitor web server logs for unusual requests containing suspicious parameters indicative of attempted exploitation. Once a patch is available, apply it promptly and verify the fix through testing. Additionally, consider employing security plugins that sanitize user inputs and outputs more robustly. Conduct regular security assessments and penetration tests focusing on XSS vulnerabilities to proactively identify and remediate similar issues.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-08T20:48:20.938Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69901aecc9e1ff5ad8689381
Added to database: 2/14/2026, 6:49:16 AM
Last enriched: 2/14/2026, 7:04:08 AM
Last updated: 2/15/2026, 7:00:53 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1793: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bdthemes Element Pack Addons for Elementor
MediumCVE-2026-1750: CWE-269 Improper Privilege Management in ecwid Ecwid by Lightspeed Ecommerce Shopping Cart
HighCVE-2026-1490: CWE-350 Reliance on Reverse DNS Resolution for a Security-Critical Action in cleantalk Spam protection, Honeypot, Anti-Spam by CleanTalk
CriticalCVE-2026-23766
UnknownCVE-2026-2312: CWE-862 Missing Authorization in maxfoundry Media Library Folders
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.