CVE-2026-6696 PUBLISHED

Zingaya Click-to-Call <= 1.0 - Reflected Cross-Site Scripting via 'email' Parameter

Assigner: Wordfence
Reserved: 20.04.2026 Published: 05.05.2026 Updated: 05.05.2026

The Zingaya Click-to-Call plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email', 'first_name', 'last_name', and 'phone' parameters on the plugin's sign-up admin page in all versions up to, and including, 1.0. This is due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS Score: 6.1

Product Status

Vendor zingaya
Product Zingaya Click-to-Call
Versions Default: unaffected
  • affected from 0 to 1.0 (incl.)

Credits

  • Julian Chibuike Nwadinobi finder

References

Problem Types

  • CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE