CVE-2026-0753
عالية / High
CVSS 7,2
VULNERABILITY BRIEF
CVE-2026-0753
المصدر الرسمي: NVD
مستوى الخطورة
عالية (High)
درجة CVSS
7,2
حالة الاستغلال KEV
غير مدرجة حاليًا
تاريخ النشر
2026-02-14
وصف الثغرة
The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sscf_name' parameter in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
الأثر المحتمل
لم تتوفر تفاصيل إضافية في المصدر الرسمي.
التوصيات والمعالجة
لم تتوفر تفاصيل إضافية في المصدر الرسمي.\nراجع روابط المصدر الرسمية.
حالة الاستغلال (KEV)
لا يوجد إدراج حاليًا في قائمة KEV.
المراجع الرسمية
- https://downloads.wordpress.org/plugin/super-simple-contact-form.1.6.2.zip
- https://plugins.trac.wordpress.org/browser/super-simple-contact-form/tags/1.6.2/super-simple-contact-form.php#L152
- https://plugins.trac.wordpress.org/browser/super-simple-contact-form/trunk/super-simple-contact-form.php#L152
- https://wordpress.org/plugins/super-simple-contact-form/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e10c0d8d-718d-45dd-9ac3-a2673a6a16af?source=cve
English Technical Fields
Description: The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sscf_name' parameter in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N