Super Simple Contact Form Vulnerability (High) – CVE-2026-0753

Super Simple Contact Form Vulnerability (High) – CVE-2026-0753

by | Feb 13, 2026 | Plugins

Attack Vectors

Severity: High (CVSS 7.2) — CVE-2026-0753 affects the Super Simple Contact Form WordPress plugin (slug: super-simple-contact-form) in versions up to and including 1.6.2.

The issue is a reflected cross-site scripting (XSS) weakness triggered through the ‘sscf_name’ parameter. In practical terms, an attacker can craft a link or request that includes malicious script content in that parameter.

Because the plugin does not adequately sanitize and escape this input, the attacker’s script can be reflected back to a page and run in a victim’s browser. This typically depends on social engineering—for example, persuading an employee, customer, or partner to click a link or interact with a page that contains the attacker-controlled parameter.

Security Weakness

CVE-2026-0753 stems from insufficient input sanitization and output escaping involving the ‘sscf_name’ parameter in Super Simple Contact Form (versions ≤ 1.6.2). This is a common root cause of reflected XSS: untrusted input is accepted and then displayed back to users without being safely handled.

Although the vulnerability is in a “simple” form plugin, the risk is not simple—contact forms often sit on high-traffic pages and are frequently accessed by prospects, customers, and internal teams, creating many opportunities for a malicious link to be used.

Remediation status: there is no known patch available at this time. Organizations should evaluate mitigations based on risk tolerance; in many cases, the safest path is to remove the affected plugin and replace it with a supported alternative.

Technical or Business Impacts

For marketing directors and business leadership, reflected XSS is primarily a trust and brand-risk event. If an attacker can get staff or customers to trigger the malicious link, they may be able to run scripts in the context of your site page, which can undermine credibility and raise concerns about data handling and governance.

Potential business impacts include misleading or altered on-page content (damaging brand integrity), increased customer support load due to suspicious behavior reports, and lost conversions if visitors abandon sessions after encountering abnormal pop-ups or redirects. Depending on where the vulnerable form appears, it can also affect campaign landing pages and lead-generation workflows.

From a governance perspective, this may trigger security incident response processes and heightened scrutiny from compliance teams—especially if the affected pages are customer-facing or tied to regulated business processes.

Similar Attacks

Reflected XSS is a well-known web risk that has affected major platforms and high-profile organizations. Examples include:

CVE-2010-1870 (WordPress): XSS in core

CVE-2012-6636 (Twitter): cross-site scripting issue

CVE-2014-6271 (Shellshock): often leveraged with web requests and injection patterns

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers