CVE-2026-32517
Received Received - Intake
Reflected XSS in Kleor Contact Manager ≀ 9.1 Enables Code Injection

Publication date: 2026-03-25

Last updated on: 2026-03-25

Assigner: Patchstack

Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kleor Contact Manager contact-manager allows Reflected XSS.This issue affects Contact Manager: from n/a through <= 9.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
kleor contact_manager to 9.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability CVE-2026-32517 is a reflected Cross-Site Scripting (XSS) flaw in the WordPress Contact Manager Plugin up to version 9.1. This type of vulnerability allows attackers to inject malicious scripts that execute in the context of users visiting the affected website.

Such XSS vulnerabilities can lead to unauthorized access to user data, session hijacking, or manipulation of website content, which may result in breaches of confidentiality and integrity of personal data.

Consequently, if exploited, this vulnerability could cause non-compliance with data protection regulations such as GDPR or HIPAA, which require adequate protection of personal and sensitive information against unauthorized access or disclosure.

Therefore, organizations using the affected plugin versions should update to version 9.1.1 or later to mitigate the risk and maintain compliance with these standards.


Can you explain this vulnerability to me?

CVE-2026-32517 is a medium severity Cross Site Scripting (XSS) vulnerability found in the WordPress Contact Manager Plugin versions up to and including 9.1.

This vulnerability allows attackers to inject malicious scripts, such as redirects, advertisements, or other harmful HTML payloads, which execute when visitors access the affected website.

The attack can be initiated by an unauthenticated user but requires a privileged user to interact with a malicious link, crafted page, or form submission for successful exploitation.

It is classified under the OWASP Top 10 category A3: Injection and has a CVSS score of 7.1, indicating moderate danger.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute malicious scripts on your website, which can lead to unauthorized redirects, display of unwanted advertisements, or other harmful actions.

Such exploitation can compromise the integrity and trustworthiness of your website, potentially affecting your users and damaging your reputation.

Because the vulnerability can be exploited in mass campaigns targeting thousands of websites, it poses a widespread risk regardless of your site's traffic or popularity.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability is a reflected Cross Site Scripting (XSS) issue in the WordPress Contact Manager Plugin up to version 9.1. Detection typically involves testing for injection of malicious scripts via input fields or URLs that reflect input without proper neutralization.

While no specific commands are provided in the resources, common detection methods include using web vulnerability scanners or manual testing by injecting typical XSS payloads (e.g., <script>alert(1)</script>) into input fields or URL parameters and observing if the script executes.

Network detection might involve monitoring HTTP requests for suspicious payloads or unusual URL parameters that could trigger the XSS vulnerability.


What immediate steps should I take to mitigate this vulnerability?

The primary immediate mitigation step is to update the WordPress Contact Manager Plugin to version 9.1.1 or later, which contains the fix for this vulnerability.

Until the update can be applied, Patchstack has issued a mitigation rule to block attacks targeting this vulnerability.

Additionally, enabling automatic mitigation and auto-update features provided by Patchstack can help protect vulnerable plugins.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart