CVE-2026-0753

Super Simple Contact Form · Super Simple Contact Form

The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sscf_name' parameter in versions up to 1.

Executive summary

The Super Simple Contact Form plugin for WordPress is susceptible to Reflected Cross-Site Scripting, which could lead to unauthorized administrative actions via social engineering.

Vulnerability

This vulnerability is a Reflected Cross-Site Scripting (XSS) flaw located in the 'sscf_name' parameter. An unauthenticated attacker can craft a malicious URL containing a script payload which, when clicked by a targeted user, executes within that user's browser session.

Business impact

Reflected XSS is frequently used in phishing campaigns to target site administrators. Successful exploitation can result in the compromise of administrative sessions, leading to full site takeover, data exfiltration, or the installation of backdoors. The CVSS score of 7.2 justifies its High severity status due to the direct path to account compromise.

Remediation

Immediate Action: Update the Super Simple Contact Form plugin to the latest version immediately to ensure proper input sanitization and output encoding.

Proactive Monitoring: Audit web logs for suspicious URL parameters containing script tags or encoded JavaScript targeting the 'sscf_name' parameter.

Compensating Controls: Use a Content Security Policy (CSP) to restrict the sources from which scripts can be executed and prevent the execution of inline scripts.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The risk of administrative account takeover via Reflected XSS is significant. Administrators should ensure that the Super Simple Contact Form plugin is updated to the latest version without delay. Additionally, educating users on the dangers of clicking untrusted links can help mitigate the risk of successful exploitation.