CVE-2026-4257: CWE-94 Improper Control of Generation of Code ('Code Injection') in supsysticcom Contact Form by Supsystic
CVE-2026-4257 is a critical Server-Side Template Injection (SSTI) vulnerability in the Contact Form by Supsystic WordPress plugin, affecting all versions up to 1. 7. 36. It allows unauthenticated attackers to inject arbitrary Twig template expressions via GET parameters using the cfsPreFill feature. This leads to remote code execution (RCE) by abusing Twig's registerUndefinedFilterCallback() to execute arbitrary PHP functions and OS commands. The vulnerability arises from the use of Twig_Loader_String without sandboxing, enabling full code injection. The CVSS score is 9. 8, reflecting its high impact and ease of exploitation without authentication or user interaction. No patches are currently available, and no known exploits have been reported in the wild yet. Organizations using this plugin on WordPress sites are at significant risk of compromise, data theft, or server takeover.
AI Analysis
Technical Summary
The Contact Form by Supsystic WordPress plugin suffers from a severe Server-Side Template Injection (SSTI) vulnerability identified as CVE-2026-4257. This vulnerability exists in all versions up to and including 1.7.36 due to the plugin's use of the Twig template engine's Twig_Loader_String loader without sandboxing. The plugin's cfsPreFill functionality accepts GET parameters to prefill form fields, but it fails to sanitize or restrict these inputs, allowing unauthenticated attackers to inject arbitrary Twig expressions. By exploiting Twig's registerUndefinedFilterCallback() method, attackers can register arbitrary PHP callbacks, enabling execution of arbitrary PHP code and operating system commands on the server hosting the WordPress site. This results in remote code execution (RCE) with no authentication or user interaction required. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code) and has a CVSS v3.1 base score of 9.8, indicating critical severity. Despite the high severity, no patches or official fixes have been released at the time of publication, and no active exploits have been reported. The vulnerability poses a significant risk to WordPress sites using this plugin, potentially allowing full server compromise, data exfiltration, or pivoting within the network.
Potential Impact
This vulnerability allows unauthenticated remote attackers to execute arbitrary code on affected WordPress servers, leading to complete compromise of the web server and potentially the underlying network. The impact includes unauthorized access to sensitive data, modification or deletion of website content, deployment of malware or ransomware, and use of the compromised server as a launchpad for further attacks. Given the widespread use of WordPress and the popularity of contact form plugins, many organizations worldwide could be affected. The ease of exploitation without authentication or user interaction significantly increases the risk of automated attacks and mass exploitation campaigns. The vulnerability threatens confidentiality, integrity, and availability of affected systems, potentially causing severe operational disruption and reputational damage.
Mitigation Recommendations
Until an official patch is released, organizations should immediately disable or uninstall the Contact Form by Supsystic plugin to eliminate the attack vector. If disabling the plugin is not feasible, restrict access to the vulnerable endpoints by implementing IP whitelisting or authentication controls at the web server or application firewall level. Deploy Web Application Firewall (WAF) rules specifically designed to detect and block malicious Twig template expressions and suspicious GET parameter payloads. Monitor web server logs and intrusion detection systems for unusual activity indicative of SSTI exploitation attempts. Regularly update all WordPress plugins and core installations to the latest versions once patches become available. Consider isolating WordPress instances in segmented network zones to limit lateral movement in case of compromise. Conduct thorough security assessments and incident response readiness to quickly detect and respond to exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, India, Brazil, Japan, Netherlands, Italy, Spain, South Korea
CVE-2026-4257: CWE-94 Improper Control of Generation of Code ('Code Injection') in supsysticcom Contact Form by Supsystic
Description
CVE-2026-4257 is a critical Server-Side Template Injection (SSTI) vulnerability in the Contact Form by Supsystic WordPress plugin, affecting all versions up to 1. 7. 36. It allows unauthenticated attackers to inject arbitrary Twig template expressions via GET parameters using the cfsPreFill feature. This leads to remote code execution (RCE) by abusing Twig's registerUndefinedFilterCallback() to execute arbitrary PHP functions and OS commands. The vulnerability arises from the use of Twig_Loader_String without sandboxing, enabling full code injection. The CVSS score is 9. 8, reflecting its high impact and ease of exploitation without authentication or user interaction. No patches are currently available, and no known exploits have been reported in the wild yet. Organizations using this plugin on WordPress sites are at significant risk of compromise, data theft, or server takeover.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Contact Form by Supsystic WordPress plugin suffers from a severe Server-Side Template Injection (SSTI) vulnerability identified as CVE-2026-4257. This vulnerability exists in all versions up to and including 1.7.36 due to the plugin's use of the Twig template engine's Twig_Loader_String loader without sandboxing. The plugin's cfsPreFill functionality accepts GET parameters to prefill form fields, but it fails to sanitize or restrict these inputs, allowing unauthenticated attackers to inject arbitrary Twig expressions. By exploiting Twig's registerUndefinedFilterCallback() method, attackers can register arbitrary PHP callbacks, enabling execution of arbitrary PHP code and operating system commands on the server hosting the WordPress site. This results in remote code execution (RCE) with no authentication or user interaction required. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code) and has a CVSS v3.1 base score of 9.8, indicating critical severity. Despite the high severity, no patches or official fixes have been released at the time of publication, and no active exploits have been reported. The vulnerability poses a significant risk to WordPress sites using this plugin, potentially allowing full server compromise, data exfiltration, or pivoting within the network.
Potential Impact
This vulnerability allows unauthenticated remote attackers to execute arbitrary code on affected WordPress servers, leading to complete compromise of the web server and potentially the underlying network. The impact includes unauthorized access to sensitive data, modification or deletion of website content, deployment of malware or ransomware, and use of the compromised server as a launchpad for further attacks. Given the widespread use of WordPress and the popularity of contact form plugins, many organizations worldwide could be affected. The ease of exploitation without authentication or user interaction significantly increases the risk of automated attacks and mass exploitation campaigns. The vulnerability threatens confidentiality, integrity, and availability of affected systems, potentially causing severe operational disruption and reputational damage.
Mitigation Recommendations
Until an official patch is released, organizations should immediately disable or uninstall the Contact Form by Supsystic plugin to eliminate the attack vector. If disabling the plugin is not feasible, restrict access to the vulnerable endpoints by implementing IP whitelisting or authentication controls at the web server or application firewall level. Deploy Web Application Firewall (WAF) rules specifically designed to detect and block malicious Twig template expressions and suspicious GET parameter payloads. Monitor web server logs and intrusion detection systems for unusual activity indicative of SSTI exploitation attempts. Regularly update all WordPress plugins and core installations to the latest versions once patches become available. Consider isolating WordPress instances in segmented network zones to limit lateral movement in case of compromise. Conduct thorough security assessments and incident response readiness to quickly detect and respond to exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-03-16T08:09:38.881Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69caf0cde6bfc5ba1d72953b
Added to database: 3/30/2026, 9:53:17 PM
Last enriched: 3/30/2026, 10:08:19 PM
Last updated: 3/31/2026, 12:00:41 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.