CVE-2026-1045: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nhomcaodem Viet contact
The Viet contact plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2026-1045 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Viet contact plugin for WordPress, affecting all versions up to and including 1.3.2. The root cause is improper input sanitization and output escaping in the plugin's admin settings, which allows authenticated users with administrator or higher privileges to inject arbitrary JavaScript code. This malicious code is stored persistently and executed whenever any user accesses the infected page. The vulnerability specifically affects multi-site WordPress installations or those where the unfiltered_html capability is disabled, limiting the scope of impact. The attack vector requires network access and high-level privileges (administrator or above), with no user interaction needed for the payload to execute once injected. The CVSS 3.1 base score is 4.4, indicating a medium severity level, with low confidentiality and integrity impact and no availability impact. No known public exploits have been reported, and no official patches have been released at the time of publication. The vulnerability falls under CWE-79, which covers improper neutralization of input during web page generation, a common cause of XSS vulnerabilities. This flaw could allow attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites, but only within the constraints of the required privileges and affected configurations.
Potential Impact
The primary impact of CVE-2026-1045 is the potential for attackers with administrator-level access to inject malicious scripts that execute in the context of users visiting the compromised pages. This can lead to session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, or distribution of malware. However, the requirement for high privileges and the limitation to multi-site or restricted unfiltered_html environments reduce the overall risk. Organizations running multi-site WordPress installations with the Viet contact plugin are at risk of internal threat actors or compromised administrators exploiting this vulnerability to escalate attacks or maintain persistence. The vulnerability does not affect availability and has limited impact on confidentiality and integrity, but it can undermine trust and lead to further exploitation if chained with other vulnerabilities. Since no public exploits are known, the immediate threat is moderate, but the potential for future exploitation exists if patches are not applied promptly.
Mitigation Recommendations
To mitigate CVE-2026-1045, organizations should first verify if they are running multi-site WordPress installations or have disabled the unfiltered_html capability while using the Viet contact plugin version 1.3.2 or earlier. Immediate mitigation steps include restricting administrator access to trusted personnel only and auditing existing admin settings for suspicious scripts or entries. Implementing a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting the plugin’s admin endpoints can provide temporary protection. Monitoring logs for unusual admin activity or script injections is also recommended. Since no official patch is available yet, consider disabling or removing the Viet contact plugin if feasible until a secure version is released. Additionally, applying the principle of least privilege by limiting administrator accounts and enabling multi-factor authentication reduces the risk of exploitation. Once a patch is released, prioritize prompt updating of the plugin. Finally, educate administrators about safe input practices and the risks of stored XSS vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, Australia, Canada, France, Netherlands, India, Brazil, Japan
CVE-2026-1045: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nhomcaodem Viet contact
Description
The Viet contact plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1045 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Viet contact plugin for WordPress, affecting all versions up to and including 1.3.2. The root cause is improper input sanitization and output escaping in the plugin's admin settings, which allows authenticated users with administrator or higher privileges to inject arbitrary JavaScript code. This malicious code is stored persistently and executed whenever any user accesses the infected page. The vulnerability specifically affects multi-site WordPress installations or those where the unfiltered_html capability is disabled, limiting the scope of impact. The attack vector requires network access and high-level privileges (administrator or above), with no user interaction needed for the payload to execute once injected. The CVSS 3.1 base score is 4.4, indicating a medium severity level, with low confidentiality and integrity impact and no availability impact. No known public exploits have been reported, and no official patches have been released at the time of publication. The vulnerability falls under CWE-79, which covers improper neutralization of input during web page generation, a common cause of XSS vulnerabilities. This flaw could allow attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites, but only within the constraints of the required privileges and affected configurations.
Potential Impact
The primary impact of CVE-2026-1045 is the potential for attackers with administrator-level access to inject malicious scripts that execute in the context of users visiting the compromised pages. This can lead to session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, or distribution of malware. However, the requirement for high privileges and the limitation to multi-site or restricted unfiltered_html environments reduce the overall risk. Organizations running multi-site WordPress installations with the Viet contact plugin are at risk of internal threat actors or compromised administrators exploiting this vulnerability to escalate attacks or maintain persistence. The vulnerability does not affect availability and has limited impact on confidentiality and integrity, but it can undermine trust and lead to further exploitation if chained with other vulnerabilities. Since no public exploits are known, the immediate threat is moderate, but the potential for future exploitation exists if patches are not applied promptly.
Mitigation Recommendations
To mitigate CVE-2026-1045, organizations should first verify if they are running multi-site WordPress installations or have disabled the unfiltered_html capability while using the Viet contact plugin version 1.3.2 or earlier. Immediate mitigation steps include restricting administrator access to trusted personnel only and auditing existing admin settings for suspicious scripts or entries. Implementing a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting the plugin’s admin endpoints can provide temporary protection. Monitoring logs for unusual admin activity or script injections is also recommended. Since no official patch is available yet, consider disabling or removing the Viet contact plugin if feasible until a secure version is released. Additionally, applying the principle of least privilege by limiting administrator accounts and enabling multi-factor authentication reduces the risk of exploitation. Once a patch is released, prioritize prompt updating of the plugin. Finally, educate administrators about safe input practices and the risks of stored XSS vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-16T16:00:14.440Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696f143c4623b1157c18a4f0
Added to database: 1/20/2026, 5:35:56 AM
Last enriched: 2/26/2026, 6:51:31 PM
Last updated: 3/26/2026, 3:55:47 AM
Views: 79
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.