Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4257: CWE-94 Improper Control of Generation of Code ('Code Injection') in supsysticcom Contact Form by Supsystic

0
Critical
VulnerabilityCVE-2026-4257cvecve-2026-4257cwe-94
Published: Mon Mar 30 2026 (03/30/2026, 21:26:10 UTC)
Source: CVE Database V5
Vendor/Project: supsysticcom
Product: Contact Form by Supsystic

Description

CVE-2026-4257 is a critical Server-Side Template Injection (SSTI) vulnerability in the Contact Form by Supsystic WordPress plugin, affecting all versions up to 1. 7. 36. It allows unauthenticated attackers to inject arbitrary Twig template expressions via GET parameters using the cfsPreFill feature. This leads to remote code execution (RCE) by abusing Twig's registerUndefinedFilterCallback() to execute arbitrary PHP functions and OS commands. The vulnerability arises from the use of Twig_Loader_String without sandboxing, enabling full code injection. The CVSS score is 9. 8, reflecting its high impact and ease of exploitation without authentication or user interaction. No patches are currently available, and no known exploits have been reported in the wild yet. Organizations using this plugin on WordPress sites are at significant risk of compromise, data theft, or server takeover.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 22:08:19 UTC

Technical Analysis

The Contact Form by Supsystic WordPress plugin suffers from a severe Server-Side Template Injection (SSTI) vulnerability identified as CVE-2026-4257. This vulnerability exists in all versions up to and including 1.7.36 due to the plugin's use of the Twig template engine's Twig_Loader_String loader without sandboxing. The plugin's cfsPreFill functionality accepts GET parameters to prefill form fields, but it fails to sanitize or restrict these inputs, allowing unauthenticated attackers to inject arbitrary Twig expressions. By exploiting Twig's registerUndefinedFilterCallback() method, attackers can register arbitrary PHP callbacks, enabling execution of arbitrary PHP code and operating system commands on the server hosting the WordPress site. This results in remote code execution (RCE) with no authentication or user interaction required. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code) and has a CVSS v3.1 base score of 9.8, indicating critical severity. Despite the high severity, no patches or official fixes have been released at the time of publication, and no active exploits have been reported. The vulnerability poses a significant risk to WordPress sites using this plugin, potentially allowing full server compromise, data exfiltration, or pivoting within the network.

Potential Impact

This vulnerability allows unauthenticated remote attackers to execute arbitrary code on affected WordPress servers, leading to complete compromise of the web server and potentially the underlying network. The impact includes unauthorized access to sensitive data, modification or deletion of website content, deployment of malware or ransomware, and use of the compromised server as a launchpad for further attacks. Given the widespread use of WordPress and the popularity of contact form plugins, many organizations worldwide could be affected. The ease of exploitation without authentication or user interaction significantly increases the risk of automated attacks and mass exploitation campaigns. The vulnerability threatens confidentiality, integrity, and availability of affected systems, potentially causing severe operational disruption and reputational damage.

Mitigation Recommendations

Until an official patch is released, organizations should immediately disable or uninstall the Contact Form by Supsystic plugin to eliminate the attack vector. If disabling the plugin is not feasible, restrict access to the vulnerable endpoints by implementing IP whitelisting or authentication controls at the web server or application firewall level. Deploy Web Application Firewall (WAF) rules specifically designed to detect and block malicious Twig template expressions and suspicious GET parameter payloads. Monitor web server logs and intrusion detection systems for unusual activity indicative of SSTI exploitation attempts. Regularly update all WordPress plugins and core installations to the latest versions once patches become available. Consider isolating WordPress instances in segmented network zones to limit lateral movement in case of compromise. Conduct thorough security assessments and incident response readiness to quickly detect and respond to exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-03-16T08:09:38.881Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69caf0cde6bfc5ba1d72953b

Added to database: 3/30/2026, 9:53:17 PM

Last enriched: 3/30/2026, 10:08:19 PM

Last updated: 3/31/2026, 12:00:41 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses