Server-Side Template Injection in Contact Form by Supsystic for WordPress
CVE-2026-4257
Key Information:
- Vendor
WordPress
- Vendor
- CVE Published:
- 30 March 2026
Badges
What is CVE-2026-4257?
CVE-2026-4257 is a severe vulnerability found in the Contact Form by Supsystic plugin for WordPress, used to facilitate user interaction through contact forms on various websites. This vulnerability is classified as a Server-Side Template Injection (SSTI) flaw, allowing attackers to execute arbitrary server-side code. Specifically, the issue arises from the plugin's utilization of the Twig templating engine without appropriate sandboxing measures, coupled with a feature that enables prefilled form values through GET parameters. This allows unauthenticated users to inject malicious Twig expressions into form fields, leading to potential Remote Code Execution (RCE) on the server. The exploitation of this vulnerability poses significant risks to organizations, as it can compromise the integrity of web applications and lead to unauthorized access to sensitive data.
Potential impact of CVE-2026-4257
-
Remote Code Execution (RCE): Attackers can execute arbitrary PHP functions and operating system commands on the server, granting them full control over the host environment, which could lead to data loss or system manipulation.
-
Data Breach Risk: With the capability to execute commands remotely, attackers can potentially access sensitive information stored on the server, leading to data breaches that could expose user data and compliance violations.
-
Website Compromise and Service Disruption: Exploitation of this vulnerability may allow attackers to modify web content or take down websites, disrupting services for end-users and damaging an organization's online reputation.
Affected Version(s)
Contact Form by Supsystic 0 <= 1.7.36
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
20% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved