Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3584: CWE-94 Improper Control of Generation of Code ('Code Injection') in wpchill Kali Forms — Contact Form & Drag-and-Drop Builder

0
Critical
VulnerabilityCVE-2026-3584cvecve-2026-3584cwe-94
Published: Fri Mar 20 2026 (03/20/2026, 21:25:11 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Kali Forms — Contact Form & Drag-and-Drop Builder

Description

The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into internal placeholder storage, combined with the use of 'call_user_func' on these placeholder values. This makes it possible for unauthenticated attackers to execute code on the server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 21:36:04 UTC

Technical Analysis

The Kali Forms plugin for WordPress, widely used for creating contact forms and drag-and-drop form builders, contains a critical vulnerability identified as CVE-2026-3584. This vulnerability stems from CWE-94: Improper Control of Generation of Code, specifically code injection. The root cause lies in the 'prepare_post_data' function, which directly maps user-supplied keys into internal placeholders without proper validation or sanitization. Subsequently, the 'form_process' function uses 'call_user_func' on these placeholders, effectively executing user-controlled input as PHP code. Because the plugin does not require authentication or user interaction to trigger this functionality, an unauthenticated remote attacker can exploit this flaw to execute arbitrary code on the web server hosting the WordPress site. This could lead to full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks. The vulnerability affects all versions up to and including 2.4.9. Although no patches or fixes have been released at the time of publication, the high CVSS score of 9.8 reflects the ease of exploitation and the severe impact on confidentiality, integrity, and availability. The vulnerability was reserved on March 5, 2026, and published on March 20, 2026, by Wordfence. No known exploits have been detected in the wild yet, but the critical nature of the flaw demands immediate attention from site administrators and security teams.

Potential Impact

The impact of CVE-2026-3584 is severe and far-reaching. Successful exploitation allows unauthenticated remote attackers to execute arbitrary code on the web server, potentially leading to complete system compromise. This can result in unauthorized access to sensitive data, modification or deletion of website content, installation of backdoors or malware, and disruption of service. Organizations relying on Kali Forms for their WordPress sites risk data breaches, reputational damage, and operational downtime. Attackers could also leverage compromised servers to launch further attacks within the network or against other targets. Given WordPress's widespread use globally, the vulnerability could affect a large number of websites, including those of small businesses, enterprises, and critical infrastructure providers. The lack of authentication and user interaction requirements significantly lowers the barrier to exploitation, increasing the likelihood of attacks once exploit code becomes publicly available.

Mitigation Recommendations

Until an official patch is released, organizations should take immediate steps to mitigate the risk. First, disable or deactivate the Kali Forms plugin on all WordPress installations if it is not essential. If the plugin is required, restrict access to the WordPress admin panel and form submission endpoints using web application firewalls (WAFs) or IP whitelisting to limit exposure to trusted users only. Employ strict input validation and sanitization at the web server or application firewall level to block suspicious payloads targeting the vulnerable functions. Monitor web server logs for unusual or suspicious requests that may indicate exploitation attempts. Regularly back up website data and configurations to enable rapid recovery in case of compromise. Additionally, maintain up-to-date WordPress core and plugins to reduce the attack surface. Security teams should prepare to apply patches promptly once they become available and consider deploying intrusion detection systems (IDS) to detect exploitation attempts. Engaging with the plugin vendor and following official security advisories is critical for timely remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-03-05T05:20:57.880Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdbd91e2bf98efc48d0977

Added to database: 3/20/2026, 9:35:13 PM

Last enriched: 3/20/2026, 9:36:04 PM

Last updated: 3/21/2026, 1:27:03 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses