Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.2
Super Simple Contact Form Plugin Allows Malicious Scripts in WordPress
CVE-2026-0753
Summary
The Super Simple Contact Form plugin for WordPress has a security flaw that could allow hackers to inject malicious code into your site. If a user clicks on a link or performs a certain action, they could be tricked into downloading malware or revealing sensitive information. Update to the latest version (1.6.3 or later) to fix this issue.
Original title
The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sscf_name' parameter in all versions up to, and including, 1.6.2 due to insufficient inpu...
Original description
The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sscf_name' parameter in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
nvd CVSS3.1
7.2
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
- https://downloads.wordpress.org/plugin/super-simple-contact-form.1.6.2.zip
- https://plugins.trac.wordpress.org/browser/super-simple-contact-form/tags/1.6.2/...
- https://plugins.trac.wordpress.org/browser/super-simple-contact-form/trunk/super...
- https://wordpress.org/plugins/super-simple-contact-form/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e10c0d8d-718d-45dd-9ac...
Published: 14 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026