Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themefic Ultimate Addons for Contact Form 7 ultimate-addons-for-contact-form-7 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ultimate Addons for Contact Form 7: from n/a through <= 3.5.36.
Published: 2026-03-13
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (XSS)
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a Cross‑Site Scripting (XSS) flaw in Themefic Ultimate Addons for Contact Form 7. Improper neutralization of input allows an attacker to inject malicious scripts that execute in victims’ browsers when they view affected pages, potentially leading to theft of session cookies, defacement, or further malware delivery. The weakness is classified as CWE‑79.

Affected Systems

The affected product is Themefic’s Ultimate Addons for Contact Form 7 plugin for WordPress. Vulnerable versions range from the earliest available release up to and including 3.5.36. Any WordPress site running a version ≤3.5.36 is impacted, regardless of the site administrator’s role.

Risk and Exploitability

The CVSS score is 6.5, indicating a moderate‑to‑high risk level. The EPSS score is below 1 %, suggesting a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The attack requires the victim to visit a page that reflects unfiltered input; an attacker could craft a link or embedded form value that injects malicious JavaScript. If the site permits untrusted users to submit content that is displayed to other users, the risk is greater; otherwise the impact is limited to specific user sessions. Nonetheless, the potential for credential theft and site compromise warrants prompt action.

Generated by OpenCVE AI on March 17, 2026 at 16:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a plugin update to the latest version of Ultimate Addons for Contact Form 7 (≥3.5.37 if available).
  • If an update is unavailable, uninstall or deactivate the plugin to eliminate the vulnerable code.
  • Restrict access to the plugin’s form functionality to trusted administrative users only as a temporary safeguard.
  • Verify that WordPress’s built‑in XSS protections and any site security plugins are actively sanitizing all rendered content.

Generated by OpenCVE AI on March 17, 2026 at 16:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Themefic
Themefic ultimate Addons For Contact Form 7
Wordpress
Wordpress wordpress
Vendors & Products Themefic
Themefic ultimate Addons For Contact Form 7
Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themefic Ultimate Addons for Contact Form 7 ultimate-addons-for-contact-form-7 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ultimate Addons for Contact Form 7: from n/a through <= 3.5.36.
Title WordPress Ultimate Addons for Contact Form 7 plugin <= 3.5.36 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Themefic Ultimate Addons For Contact Form 7
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:16:22.175Z

Reserved: 2026-03-12T11:11:45.408Z

Link: CVE-2026-32460

cve-icon Vulnrichment

Updated: 2026-03-16T13:42:52.685Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-13T19:55:08.447

Modified: 2026-03-16T14:53:46.157

Link: CVE-2026-32460

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T12:03:05Z

Weaknesses