Description
The Simple Contact Form Plugin for WordPress – WP Easy Contact plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'emd_mb_meta' shortcode in all versions up to, and including, 4.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-06-04
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The plugin stored user‑supplied attributes in a shortcode handler that performed no input sanitization or output escaping. An attacker with contributor‑level access can inject JavaScript into the stored data, which will run whenever a visitor loads a page including the shortcode. This can lead to session hijacking, credential theft, or defacement of the site content, but it does not provide direct remote code execution on the server.

Affected Systems

The vulnerability applies to the WP Easy Contact plugin for WordPress from emarket‑design, versions 4.0.0 and earlier. Versions released after 4.0.0 are not listed as affected and are presumed to contain the fix.

Risk and Exploitability

The CVSS score of 6.4 categorizes this as a moderate severity issue. The EPSS indicates a very low exploitation probability (<1%) and it is not yet listed in CISA’s KEV catalog. However, because any authenticated contributor can exploit it via the shortcode feature, an attacker who has gained access to the site with contributor privileges could effectively deliver the exploit. The attack path requires the attacker to create or edit content that includes the vulnerable shortcode, so knowledge of where the plugin is used and the ability to publish content are prerequisites.

Generated by OpenCVE AI on April 20, 2026 at 22:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP Easy Contact plugin to the latest release that incorporates the XSS mitigation.
  • After upgrading, audit and remove any existing ‘emd_mb_meta’ shortcode instances that may contain malicious or legacy content.
  • Apply stricter role‑based access controls so that only trusted administrators can add or edit content that uses the plugin’s shortcodes, and consider disabling the shortcode functionality if it is not essential for site operation.

Generated by OpenCVE AI on April 20, 2026 at 22:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-16817 The Simple Contact Form Plugin for WordPress – WP Easy Contact plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'emd_mb_meta' shortcode in all versions up to, and including, 4.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Wed, 08 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 10 Jul 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Emarketdesign
Emarketdesign wp Easy Contact
CPEs cpe:2.3:a:emarketdesign:wp_easy_contact:*:*:*:*:*:wordpress:*:*
Vendors & Products Emarketdesign
Emarketdesign wp Easy Contact

Wed, 04 Jun 2025 04:30:00 +0000

Type Values Removed Values Added
Description The Simple Contact Form Plugin for WordPress – WP Easy Contact plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'emd_mb_meta' shortcode in all versions up to, and including, 4.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Simplify Contact Management: WP Easy Contact <= 4.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Emarketdesign Wp Easy Contact
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:33:20.778Z

Reserved: 2025-06-03T15:47:01.590Z

Link: CVE-2025-5539

cve-icon Vulnrichment

Updated: 2025-06-04T13:47:00.661Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-04T05:15:24.733

Modified: 2025-07-10T14:21:01.203

Link: CVE-2025-5539

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:45:20Z

Weaknesses