CVE-2026-3584: CWE-94 Improper Control of Generation of Code ('Code Injection') in wpchill Kali Forms — Contact Form & Drag-and-Drop Builder
The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into internal placeholder storage, combined with the use of 'call_user_func' on these placeholder values. This makes it possible for unauthenticated attackers to execute code on the server.
AI Analysis
Technical Summary
The Kali Forms plugin for WordPress, widely used for creating contact forms and drag-and-drop form builders, contains a critical vulnerability identified as CVE-2026-3584. This vulnerability stems from CWE-94: Improper Control of Generation of Code, specifically code injection. The root cause lies in the 'prepare_post_data' function, which directly maps user-supplied keys into internal placeholders without proper validation or sanitization. Subsequently, the 'form_process' function uses 'call_user_func' on these placeholders, effectively executing user-controlled input as PHP code. Because the plugin does not require authentication or user interaction to trigger this functionality, an unauthenticated remote attacker can exploit this flaw to execute arbitrary code on the web server hosting the WordPress site. This could lead to full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks. The vulnerability affects all versions up to and including 2.4.9. Although no patches or fixes have been released at the time of publication, the high CVSS score of 9.8 reflects the ease of exploitation and the severe impact on confidentiality, integrity, and availability. The vulnerability was reserved on March 5, 2026, and published on March 20, 2026, by Wordfence. No known exploits have been detected in the wild yet, but the critical nature of the flaw demands immediate attention from site administrators and security teams.
Potential Impact
The impact of CVE-2026-3584 is severe and far-reaching. Successful exploitation allows unauthenticated remote attackers to execute arbitrary code on the web server, potentially leading to complete system compromise. This can result in unauthorized access to sensitive data, modification or deletion of website content, installation of backdoors or malware, and disruption of service. Organizations relying on Kali Forms for their WordPress sites risk data breaches, reputational damage, and operational downtime. Attackers could also leverage compromised servers to launch further attacks within the network or against other targets. Given WordPress's widespread use globally, the vulnerability could affect a large number of websites, including those of small businesses, enterprises, and critical infrastructure providers. The lack of authentication and user interaction requirements significantly lowers the barrier to exploitation, increasing the likelihood of attacks once exploit code becomes publicly available.
Mitigation Recommendations
Until an official patch is released, organizations should take immediate steps to mitigate the risk. First, disable or deactivate the Kali Forms plugin on all WordPress installations if it is not essential. If the plugin is required, restrict access to the WordPress admin panel and form submission endpoints using web application firewalls (WAFs) or IP whitelisting to limit exposure to trusted users only. Employ strict input validation and sanitization at the web server or application firewall level to block suspicious payloads targeting the vulnerable functions. Monitor web server logs for unusual or suspicious requests that may indicate exploitation attempts. Regularly back up website data and configurations to enable rapid recovery in case of compromise. Additionally, maintain up-to-date WordPress core and plugins to reduce the attack surface. Security teams should prepare to apply patches promptly once they become available and consider deploying intrusion detection systems (IDS) to detect exploitation attempts. Engaging with the plugin vendor and following official security advisories is critical for timely remediation.
Affected Countries
United States, Germany, United Kingdom, India, Australia, Canada, France, Brazil, Japan, Netherlands, Italy, Spain
CVE-2026-3584: CWE-94 Improper Control of Generation of Code ('Code Injection') in wpchill Kali Forms — Contact Form & Drag-and-Drop Builder
Description
The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into internal placeholder storage, combined with the use of 'call_user_func' on these placeholder values. This makes it possible for unauthenticated attackers to execute code on the server.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Kali Forms plugin for WordPress, widely used for creating contact forms and drag-and-drop form builders, contains a critical vulnerability identified as CVE-2026-3584. This vulnerability stems from CWE-94: Improper Control of Generation of Code, specifically code injection. The root cause lies in the 'prepare_post_data' function, which directly maps user-supplied keys into internal placeholders without proper validation or sanitization. Subsequently, the 'form_process' function uses 'call_user_func' on these placeholders, effectively executing user-controlled input as PHP code. Because the plugin does not require authentication or user interaction to trigger this functionality, an unauthenticated remote attacker can exploit this flaw to execute arbitrary code on the web server hosting the WordPress site. This could lead to full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks. The vulnerability affects all versions up to and including 2.4.9. Although no patches or fixes have been released at the time of publication, the high CVSS score of 9.8 reflects the ease of exploitation and the severe impact on confidentiality, integrity, and availability. The vulnerability was reserved on March 5, 2026, and published on March 20, 2026, by Wordfence. No known exploits have been detected in the wild yet, but the critical nature of the flaw demands immediate attention from site administrators and security teams.
Potential Impact
The impact of CVE-2026-3584 is severe and far-reaching. Successful exploitation allows unauthenticated remote attackers to execute arbitrary code on the web server, potentially leading to complete system compromise. This can result in unauthorized access to sensitive data, modification or deletion of website content, installation of backdoors or malware, and disruption of service. Organizations relying on Kali Forms for their WordPress sites risk data breaches, reputational damage, and operational downtime. Attackers could also leverage compromised servers to launch further attacks within the network or against other targets. Given WordPress's widespread use globally, the vulnerability could affect a large number of websites, including those of small businesses, enterprises, and critical infrastructure providers. The lack of authentication and user interaction requirements significantly lowers the barrier to exploitation, increasing the likelihood of attacks once exploit code becomes publicly available.
Mitigation Recommendations
Until an official patch is released, organizations should take immediate steps to mitigate the risk. First, disable or deactivate the Kali Forms plugin on all WordPress installations if it is not essential. If the plugin is required, restrict access to the WordPress admin panel and form submission endpoints using web application firewalls (WAFs) or IP whitelisting to limit exposure to trusted users only. Employ strict input validation and sanitization at the web server or application firewall level to block suspicious payloads targeting the vulnerable functions. Monitor web server logs for unusual or suspicious requests that may indicate exploitation attempts. Regularly back up website data and configurations to enable rapid recovery in case of compromise. Additionally, maintain up-to-date WordPress core and plugins to reduce the attack surface. Security teams should prepare to apply patches promptly once they become available and consider deploying intrusion detection systems (IDS) to detect exploitation attempts. Engaging with the plugin vendor and following official security advisories is critical for timely remediation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-03-05T05:20:57.880Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bdbd91e2bf98efc48d0977
Added to database: 3/20/2026, 9:35:13 PM
Last enriched: 3/20/2026, 9:36:04 PM
Last updated: 3/21/2026, 1:27:03 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.