Stored Cross-Site Scripting in Contact List Plugin for WordPress
CVE-2026-3516
Key Information:
- Vendor
WordPress
- Vendor
- CVE Published:
- 20 March 2026
Badges
What is CVE-2026-3516?
The Contact List plugin for WordPress is vulnerable to Stored Cross-Site Scripting through the '_cl_map_iframe' parameter. This vulnerability exists due to inadequate input sanitization and output escaping routines, specifically in the handling of the Google Maps iframe custom field. The saveCustomFields() function employs regex to extract tags but fails to validate the iframe's attributes, enabling the inclusion of unsafe event handlers like 'onload'. The stored iframe HTML is then displayed on the front-end without proper sanitization or wp_kses filtering. As a result, authenticated attackers with Contributor-level access or higher can inject malicious scripts that execute whenever users visit affected pages.
Affected Version(s)
Contact List β Online Staff Directory & Address Book 0 <= 3.0.18
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved