Medium severity6.1NVD Advisory· Published May 5, 2026· Updated May 5, 2026
CVE-2026-6696
CVE-2026-6696
Description
The Zingaya Click-to-Call plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email', 'first_name', 'last_name', and 'phone' parameters on the plugin's sign-up admin page in all versions up to, and including, 1.0. This is due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected products
2- Range: <=1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- plugins.trac.wordpress.org/browser/zingaya-click-to-call/tags/1.0/zingaya-admin.phpnvd
- plugins.trac.wordpress.org/browser/zingaya-click-to-call/tags/1.0/zingaya-admin.phpnvd
- plugins.trac.wordpress.org/browser/zingaya-click-to-call/tags/1.0/zingaya-admin.phpnvd
- plugins.trac.wordpress.org/browser/zingaya-click-to-call/tags/1.0/zingaya-admin.phpnvd
- wordpress.org/plugins/zingaya-click-to-call/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/5bdd515c-6b52-467c-9446-6ae9b3b75e50nvd
News mentions
1- Wordfence Intelligence Weekly WordPress Vulnerability Report (May 4, 2026 to May 10, 2026)Wordfence Blog · May 14, 2026