| Plugin Name | WordPress Contact List Plugin |
|---|---|
| Type of Vulnerability | Cross-Site Scripting (XSS) |
| CVE Number | CVE-2026-3516 |
| Urgency | Low |
| CVE Publish Date | 2026-03-20 |
| Source URL | CVE-2026-3516 |
Authenticated Stored XSS in the Contact List Plugin (CVE-2026-3516) — What WordPress Site Owners and Admins Need to Do Right Now
Date: 20 March 2026
Author: Hong Kong Security Expert
A stored cross-site scripting (XSS) vulnerability was disclosed in the Contact List WordPress plugin (versions ≤ 3.0.18). An authenticated Contributor-level user can inject a crafted value via the plugin parameter _cl_map_iframe, which the plugin may store and later render without adequate sanitization. The issue is tracked as CVE-2026-3516 and was patched in version 3.0.19. Stored XSS is particularly dangerous because malicious scripts persist in the database and execute whenever the affected content is viewed by users with the relevant context.
Executive summary (quick takeaways)
- A stored XSS vulnerability exists in Contact List <= 3.0.18 and was fixed in 3.0.19. Contributor-level users can supply a crafted
_cl_map_iframevalue that may be saved and later rendered. - Impact: session theft, privilege escalation (via CSRF+XSS chains), redirects, content manipulation, or persistent defacement depending on where the payload renders.
- Immediate actions: