Description
The Viet contact plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: 2026-01-20
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting in WordPress Viet Contact plugin that requires administrator privileges
Action: Apply Patch
AI Analysis

Impact

Viet Contact, a WordPress plugin, contains a stored cross‑site scripting flaw limited to its administrative settings. The bug allows administrators or higher‑privileged users to place arbitrary scripts via the ll1‑ll4 parameters, because the plugin does not properly sanitize or escape output. The injected script is stored and executed whenever a user views the compromised page, enabling malicious payloads such as credential theft or defacement.

Affected Systems

WordPress plugin Viet Contact, versions 1.3.2 and earlier, is affected. The vulnerability is exposed only in multisite installations that have the unfiltered_html capability disabled.

Risk and Exploitability

With a CVSS base score of 4.4 the technical severity is low, but the EPSS score is below 1 % and the flaw is not listed in CISA’s KEV catalog, suggesting low exploitation likelihood in the wild. Nonetheless, because the vulnerability grants stored script injection that runs for all page visitors, an attacker who has administrative credentials could hijack sessions, spy on users, or alter content. The attack vector is inferred to require authenticated administrative access and the presence of the plugin’s configurable fields.

Generated by OpenCVE AI on April 16, 2026 at 07:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Viet Contact plugin to the most recent version or remove it entirely.
  • Remove the unfiltered_html capability from administrators on multisite installations to prevent raw HTML input.
  • If an update cannot be applied immediately, configure a Web Application Firewall to strip or encode script tags from the ll1‑ll4 parameters before rendering.

Generated by OpenCVE AI on April 16, 2026 at 07:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 20 Jan 2026 05:45:00 +0000

Type Values Removed Values Added
Description The Viet contact plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Title Viet contact <= 1.3.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'll1', 'll2', 'll3', and 'll4' Parameters
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:35.139Z

Reserved: 2026-01-16T16:00:14.440Z

Link: CVE-2026-1045

cve-icon Vulnrichment

Updated: 2026-01-20T20:24:43.739Z

cve-icon NVD

Status : Deferred

Published: 2026-01-20T06:16:00.640

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1045

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T08:00:11Z

Weaknesses