Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1045: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nhomcaodem Viet contact

0
Medium
VulnerabilityCVE-2026-1045cvecve-2026-1045cwe-79
Published: Tue Jan 20 2026 (01/20/2026, 05:30:17 UTC)
Source: CVE Database V5
Vendor/Project: nhomcaodem
Product: Viet contact

Description

CVE-2026-1045 is a stored Cross-Site Scripting (XSS) vulnerability in the Viet contact WordPress plugin affecting all versions up to 1. 3. 2. It allows authenticated administrators on multi-site WordPress installations with unfiltered_html disabled to inject malicious scripts via admin settings. These scripts execute when any user accesses the compromised page, potentially leading to session hijacking or privilege escalation. The vulnerability requires high privileges and does not need user interaction but has a medium CVSS score of 4. 4 due to limited attack surface. No known exploits are currently reported in the wild. European organizations using multi-site WordPress with this plugin should prioritize patching or mitigating this issue to prevent targeted attacks. Mitigations include restricting admin access, enabling input sanitization, and monitoring for suspicious script injections.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:22:23 UTC

Technical Analysis

CVE-2026-1045 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 found in the Viet contact plugin for WordPress. This vulnerability affects all versions up to and including 1.3.2. It arises from improper neutralization of input during web page generation, specifically due to insufficient input sanitization and output escaping in the plugin's admin settings interface. The flaw allows an authenticated attacker with administrator-level permissions or higher to inject arbitrary JavaScript code into pages managed by the plugin. These malicious scripts are stored persistently and executed whenever any user accesses the infected page, potentially compromising user sessions or enabling further attacks such as privilege escalation or data theft. The vulnerability specifically impacts WordPress multi-site installations where the unfiltered_html capability is disabled, limiting the attack surface to environments with stricter content filtering. The CVSS v3.1 base score is 4.4 (medium severity), reflecting the need for high privileges to exploit and the absence of user interaction. No public exploits have been reported so far. The vulnerability was published on January 20, 2026, and assigned by Wordfence. Due to the nature of stored XSS, the risk includes persistent compromise of site visitors and administrators, making it a significant concern for organizations relying on this plugin in multi-site WordPress environments.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily in environments using WordPress multi-site configurations with the Viet contact plugin installed. Exploitation can lead to unauthorized script execution, enabling attackers to hijack user sessions, steal sensitive information, or perform actions on behalf of legitimate users. This can compromise confidentiality and integrity of data, especially in administrative contexts. Although availability impact is minimal, the persistent nature of stored XSS can facilitate further attacks and undermine trust in affected websites. Organizations in sectors such as government, finance, and e-commerce that rely on WordPress multi-site setups for managing multiple domains or subsidiaries are at higher risk. The requirement for administrator-level access limits the threat to insiders or attackers who have already breached initial defenses, but the potential damage from such exploitation remains significant. Additionally, the lack of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Immediately update the Viet contact plugin to a patched version once available; if no patch exists yet, consider disabling the plugin or restricting its use in multi-site environments. 2. Limit administrator-level access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 3. Review and harden WordPress multi-site configurations, ensuring that unfiltered_html capability is enabled only when necessary and monitored closely. 4. Implement Web Application Firewalls (WAF) with rules to detect and block suspicious script injections targeting the plugin's admin settings. 5. Conduct regular security audits and code reviews of custom plugins and themes to identify similar input sanitization issues. 6. Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 7. Educate administrators about the risks of stored XSS and safe content management practices. 8. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. These measures collectively reduce the likelihood of exploitation and limit the impact if an attack occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-16T16:00:14.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696f143c4623b1157c18a4f0

Added to database: 1/20/2026, 5:35:56 AM

Last enriched: 1/27/2026, 8:22:23 PM

Last updated: 2/7/2026, 6:19:16 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats