Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0753: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bitacre Super Simple Contact Form

0
High
VulnerabilityCVE-2026-0753cvecve-2026-0753cwe-79
Published: Sat Feb 14 2026 (02/14/2026, 06:42:35 UTC)
Source: CVE Database V5
Vendor/Project: bitacre
Product: Super Simple Contact Form

Description

The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sscf_name' parameter in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 02/14/2026, 07:04:08 UTC

Technical Analysis

CVE-2026-0753 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Super Simple Contact Form plugin for WordPress, developed by bitacre. The vulnerability exists in all versions up to and including 1.6.2 due to insufficient sanitization and escaping of user-supplied input in the 'sscf_name' parameter. Reflected XSS occurs when malicious input is immediately returned in the HTTP response without proper neutralization, allowing attackers to inject arbitrary JavaScript code. Since the vulnerability is unauthenticated and exploitable remotely via crafted URLs, an attacker can lure victims into clicking malicious links that execute scripts in their browsers. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. The CVSS 3.1 base score of 7.2 indicates a high-severity issue with network attack vector, low attack complexity, no privileges required, and no user interaction beyond clicking a link. The scope is changed (S:C), meaning the vulnerability affects components beyond the vulnerable plugin itself, potentially impacting the entire WordPress site. No patches were linked at the time of disclosure, and no known exploits in the wild have been reported, but the vulnerability poses a significant risk given WordPress's widespread use. The CWE-79 classification highlights the root cause as improper neutralization of input during web page generation. The vulnerability's impact is primarily on confidentiality and integrity, with no direct availability impact. The plugin is commonly used to add simple contact forms to WordPress sites, making it a frequent target for attackers seeking to exploit XSS to compromise user sessions or steal data.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those relying on WordPress websites with the Super Simple Contact Form plugin installed. Exploitation can lead to unauthorized access to user sessions, theft of sensitive customer data, and potential defacement or redirection attacks that damage brand reputation. E-commerce sites, government portals, and service providers using this plugin are particularly vulnerable to customer data breaches and fraud. The reflected XSS can also be used as a vector for delivering further malware or phishing attacks, increasing the overall threat landscape. Given the high adoption of WordPress in Europe, the potential attack surface is large. The vulnerability's ability to be exploited without authentication and with minimal user interaction increases the likelihood of successful attacks. Additionally, the changed scope means that the impact can extend beyond the plugin to the entire website, potentially affecting backend systems or other integrated services. This can lead to regulatory compliance issues under GDPR if personal data is compromised, resulting in legal and financial consequences.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Super Simple Contact Form plugin and its version. Until an official patch is released, consider temporarily disabling or removing the plugin to eliminate the attack vector. Deploy Web Application Firewalls (WAFs) with specific rules to detect and block malicious payloads targeting the 'sscf_name' parameter. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected web pages. Educate users and staff about the risks of clicking unsolicited or suspicious links, especially those that may appear in emails or social media. Monitor web server logs for unusual requests containing suspicious parameters indicative of attempted exploitation. Once a patch is available, apply it promptly and verify the fix through testing. Additionally, consider employing security plugins that sanitize user inputs and outputs more robustly. Conduct regular security assessments and penetration tests focusing on XSS vulnerabilities to proactively identify and remediate similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-08T20:48:20.938Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69901aecc9e1ff5ad8689381

Added to database: 2/14/2026, 6:49:16 AM

Last enriched: 2/14/2026, 7:04:08 AM

Last updated: 2/15/2026, 7:00:53 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats