Description
The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sscf_name' parameter in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-02-14
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a reflected XSS flaw in the Super Simple Contact Form WordPress plugin caused by the lack of sanitization of the 'sscf_name' query parameter. Because the plugin echoes the parameter unsafely, an unauthenticated attacker can embed malicious scripts that will run in the victim's browser when a crafted URL is clicked. This gives an attacker the ability to execute arbitrary client‑side code, potentially leading to session hijacking, defacement, or phishing, and generally undermining the integrity and confidentiality of the affected site.

Affected Systems

The affected product is the WordPress plugin Super Simple Contact Form by bitacre, versions up through and including 1.6.2. Any site running these versions is vulnerable; newer releases beyond 1.6.2 are not mentioned as affected.

Risk and Exploitability

The CVSS score of 7.2 classifies this as high severity. The EPSS score is below 1%, suggesting a low probability of widespread exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog, indicating no confirmed or widespread exploitation reports. Likely attack vectors would involve phishing links that prompt the victim to click a URL containing a malicious payload. Because the flaw is client‑side, no attacker‑side server compromise is required to exploit it, and authentication is not needed. The impact is limited to the browser context of the victim.

Generated by OpenCVE AI on April 15, 2026 at 20:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Super Simple Contact Form to a version newer than 1.6.2
  • If an upgrade is not immediately possible, implement server‑side sanitization of the 'sscf_name' parameter or disable the affected form field
  • Deploy a web application firewall rule or adopt input‑validation filters to block or escape suspicious XSS payloads in query parameters, and reinforce user education about clicking unknown links

Generated by OpenCVE AI on April 15, 2026 at 20:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Bitacre
Bitacre super Simple Contact Form
Wordpress
Wordpress wordpress
Vendors & Products Bitacre
Bitacre super Simple Contact Form
Wordpress
Wordpress wordpress

Sat, 14 Feb 2026 06:45:00 +0000

Type Values Removed Values Added
Description The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sscf_name' parameter in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Super Simple Contact Form <= 1.6.2 - Reflected Cross-Site Scripting via 'sscf_name' Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Bitacre Super Simple Contact Form
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:28:51.709Z

Reserved: 2026-01-08T20:48:20.938Z

Link: CVE-2026-0753

cve-icon Vulnrichment

Updated: 2026-02-18T20:33:07.317Z

cve-icon NVD

Status : Deferred

Published: 2026-02-14T07:16:09.450

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0753

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:45:06Z

Weaknesses