CVE-2024-13453: CWE-94 Improper Control of Generation of Code ('Code Injection') in smub Contact Form & SMTP Plugin for WordPress by PirateForms
CVE-2024-13453 is a high-severity vulnerability in the Contact Form & SMTP Plugin for WordPress by PirateForms, affecting all versions up to 2. 6. 0. It allows unauthenticated attackers to execute arbitrary shortcodes due to improper validation before calling do_shortcode, leading to code injection (CWE-94). This flaw can compromise confidentiality, integrity, and availability of affected WordPress sites without requiring user interaction or authentication. Exploitation could enable attackers to run malicious code, potentially leading to data leakage, site defacement, or denial of service. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or apply mitigations to prevent exploitation. Countries with significant WordPress usage and high adoption of this plugin, including the United States, Germany, United Kingdom, Canada, Australia, and India, are at higher risk. The CVSS score of 7.
AI Analysis
Technical Summary
CVE-2024-13453 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the Contact Form & SMTP Plugin for WordPress by PirateForms. This plugin, widely used for managing contact forms and SMTP email functionality on WordPress sites, suffers from a critical flaw in all versions up to and including 2.6.0. The vulnerability arises because the plugin improperly validates input before passing it to the WordPress do_shortcode function, which processes shortcodes embedded in content. An unauthenticated attacker can exploit this by submitting crafted input that triggers arbitrary shortcode execution. Since shortcodes can execute PHP code or other sensitive operations, this leads to a code injection scenario. The vulnerability does not require any authentication or user interaction, making it highly accessible for remote attackers. The CVSS 3.1 base score of 7.3 indicates a high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact includes potential unauthorized disclosure of information, modification of site content, and disruption of service. Although no exploits have been reported in the wild yet, the vulnerability's nature and ease of exploitation make it a significant risk for WordPress sites using this plugin. The lack of available patches at the time of disclosure increases urgency for mitigation.
Potential Impact
The impact of CVE-2024-13453 is substantial for organizations relying on the affected WordPress plugin. Successful exploitation allows attackers to execute arbitrary shortcodes remotely without authentication, which can lead to unauthorized code execution on the web server. This can result in data leakage, defacement of websites, insertion of malicious content, or complete site takeover. The integrity of website content and the confidentiality of user data can be compromised. Availability may also be affected if attackers deploy denial-of-service payloads or disrupt normal plugin functionality. Given WordPress's widespread use globally, especially among small to medium businesses and content-driven websites, this vulnerability poses a broad risk. Attackers could leverage this flaw to establish persistent backdoors or pivot to other internal systems. The absence of known exploits currently provides a window for proactive defense, but the vulnerability’s characteristics suggest it could be rapidly weaponized once publicized.
Mitigation Recommendations
To mitigate CVE-2024-13453, organizations should immediately update the Contact Form & SMTP Plugin for WordPress by PirateForms to a patched version once available. Until a patch is released, administrators should consider disabling or removing the plugin to eliminate the attack surface. Implementing Web Application Firewall (WAF) rules to detect and block suspicious shortcode patterns or unusual POST requests targeting the plugin endpoints can provide temporary protection. Restricting access to the WordPress admin and plugin endpoints via IP whitelisting or VPN can reduce exposure. Regularly auditing installed plugins for vulnerabilities and minimizing the use of plugins from less-established vendors can reduce risk. Monitoring logs for unusual shortcode execution attempts or unexpected site behavior is critical for early detection. Additionally, enforcing the principle of least privilege for WordPress users and isolating the WordPress environment can limit the impact of potential exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2024-13453: CWE-94 Improper Control of Generation of Code ('Code Injection') in smub Contact Form & SMTP Plugin for WordPress by PirateForms
Description
CVE-2024-13453 is a high-severity vulnerability in the Contact Form & SMTP Plugin for WordPress by PirateForms, affecting all versions up to 2. 6. 0. It allows unauthenticated attackers to execute arbitrary shortcodes due to improper validation before calling do_shortcode, leading to code injection (CWE-94). This flaw can compromise confidentiality, integrity, and availability of affected WordPress sites without requiring user interaction or authentication. Exploitation could enable attackers to run malicious code, potentially leading to data leakage, site defacement, or denial of service. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or apply mitigations to prevent exploitation. Countries with significant WordPress usage and high adoption of this plugin, including the United States, Germany, United Kingdom, Canada, Australia, and India, are at higher risk. The CVSS score of 7.
AI-Powered Analysis
Technical Analysis
CVE-2024-13453 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the Contact Form & SMTP Plugin for WordPress by PirateForms. This plugin, widely used for managing contact forms and SMTP email functionality on WordPress sites, suffers from a critical flaw in all versions up to and including 2.6.0. The vulnerability arises because the plugin improperly validates input before passing it to the WordPress do_shortcode function, which processes shortcodes embedded in content. An unauthenticated attacker can exploit this by submitting crafted input that triggers arbitrary shortcode execution. Since shortcodes can execute PHP code or other sensitive operations, this leads to a code injection scenario. The vulnerability does not require any authentication or user interaction, making it highly accessible for remote attackers. The CVSS 3.1 base score of 7.3 indicates a high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact includes potential unauthorized disclosure of information, modification of site content, and disruption of service. Although no exploits have been reported in the wild yet, the vulnerability's nature and ease of exploitation make it a significant risk for WordPress sites using this plugin. The lack of available patches at the time of disclosure increases urgency for mitigation.
Potential Impact
The impact of CVE-2024-13453 is substantial for organizations relying on the affected WordPress plugin. Successful exploitation allows attackers to execute arbitrary shortcodes remotely without authentication, which can lead to unauthorized code execution on the web server. This can result in data leakage, defacement of websites, insertion of malicious content, or complete site takeover. The integrity of website content and the confidentiality of user data can be compromised. Availability may also be affected if attackers deploy denial-of-service payloads or disrupt normal plugin functionality. Given WordPress's widespread use globally, especially among small to medium businesses and content-driven websites, this vulnerability poses a broad risk. Attackers could leverage this flaw to establish persistent backdoors or pivot to other internal systems. The absence of known exploits currently provides a window for proactive defense, but the vulnerability’s characteristics suggest it could be rapidly weaponized once publicized.
Mitigation Recommendations
To mitigate CVE-2024-13453, organizations should immediately update the Contact Form & SMTP Plugin for WordPress by PirateForms to a patched version once available. Until a patch is released, administrators should consider disabling or removing the plugin to eliminate the attack surface. Implementing Web Application Firewall (WAF) rules to detect and block suspicious shortcode patterns or unusual POST requests targeting the plugin endpoints can provide temporary protection. Restricting access to the WordPress admin and plugin endpoints via IP whitelisting or VPN can reduce exposure. Regularly auditing installed plugins for vulnerabilities and minimizing the use of plugins from less-established vendors can reduce risk. Monitoring logs for unusual shortcode execution attempts or unexpected site behavior is critical for early detection. Additionally, enforcing the principle of least privilege for WordPress users and isolating the WordPress environment can limit the impact of potential exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-16T13:03:34.002Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e57b7ef31ef0b59ea15
Added to database: 2/25/2026, 9:49:11 PM
Last enriched: 2/26/2026, 12:55:47 AM
Last updated: 2/26/2026, 6:03:08 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.