Ultra Addons for Contact Form 7 Vulnerability (Medium) – CVE-2026-3…

Ultra Addons for Contact Form 7 Vulnerability (Medium) – CVE-2026-3…

by | Mar 19, 2026 | Plugins

Attack Vectors

Ultra Addons for Contact Form 7 (slug: ultimate-addons-for-contact-form-7) is affected by an Authenticated (Contributor+) Stored Cross-Site Scripting (XSS) vulnerability in versions up to and including 3.5.36 (CVE: CVE-2026-32460). The severity is rated Medium with a CVSS score of 6.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).

The attack requires a user who already has a WordPress account with Contributor-level access or higher. That user can inject malicious script content into affected plugin-controlled fields. Because this is stored XSS, the script can run later for anyone who views the impacted page in a browser—often including editors, administrators, or internal staff reviewing site content.

Security Weakness

According to the vulnerability report, the issue is caused by insufficient input sanitization and output escaping. In practical terms, this means the plugin may accept certain content that should be treated as unsafe, and then render it back on a page in a way that allows the browser to execute it as code.

This matters because stored XSS can turn normal content workflows (creating or editing pages/forms) into a pathway for persistent, repeatable compromise—especially in organizations where multiple teams, agencies, or contractors have authoring access.

Technical or Business Impacts

While the severity is classified as Medium, stored XSS can create outsized business risk because it targets real users and trusted sessions. Potential outcomes include:

Account and session abuse: If an administrator views an injected page, the script may be able to perform actions in the admin’s browser context, potentially leading to unauthorized changes (depending on what the attacker is able to execute and what the admin loads).

Brand and website integrity damage: Attackers can alter on-page content, redirect visitors, or inject deceptive messages. Even short-lived visible defacement or misleading pop-ups can reduce conversion rates and erode trust.

Data exposure risk: Stored scripts can sometimes capture data entered into forms or displayed in the browser. This can become a compliance concern if personal data is involved.

Operational disruption: Incident response time, emergency patching, and stakeholder communications can pull marketing and IT resources away from revenue-generating work.

Recommended remediation: Update Ultra Addons for Contact Form 7 to version 3.5.37 or newer (patched). Source: Wordfence vulnerability advisory.

Similar Attacks

MySpace “Samy” worm (2005): A famous real-world example of stored XSS that propagated rapidly by executing when other users viewed an infected profile, demonstrating how “viewing a page” can be enough to spread impact. Reference: https://en.wikipedia.org/wiki/Samy_(computer_worm)

TweetDeck XSS incident (2014): A worm-like XSS event that automatically posted content when users viewed affected tweets via TweetDeck, highlighting how trusted platforms can be leveraged through injected scripts. Reference: https://www.bbc.com/news/technology-28275316

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers