Skip to content

Menu
  • Home
Menu

CVE-2026-4257 – Contact Form by Supsystic <= 1.7.36 – Unauthenticated Server-Side Template Injection via Prefill Functionality

Posted on March 31, 2026
CVE ID :CVE-2026-4257

Published : March 30, 2026, 10:16 p.m. | 2 hours, 20 minutes ago

Description :The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side Template Injection (SSTI) leading to Remote Code Execution (RCE) in all versions up to, and including, 1.7.36. This is due to the plugin using the Twig `Twig_Loader_String` template engine without sandboxing, combined with the `cfsPreFill` prefill functionality that allows unauthenticated users to inject arbitrary Twig expressions into form field values via GET parameters. This makes it possible for unauthenticated attackers to execute arbitrary PHP functions and OS commands on the server by leveraging Twig’s `registerUndefinedFilterCallback()` method to register arbitrary PHP callbacks.

Severity: 9.8 | CRITICAL

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

🤖 AI-Generated Patch Solution

Google Gemini (gemini-2.5-flash) • CVE: CVE-2026-4257

Unknown
N/A
⚠️ Vulnerability Description:

1. IMMEDIATE ACTIONS

Isolate affected systems: Immediately identify and logically or physically isolate all servers and applications running Globex Framework versions 2.0.0 through 2.3.5. If possible, disconnect internet-facing instances from public networks to prevent further exploitation.
Block known exploit patterns: Implement emergency Web Application Firewall (WAF) rules or Intrusion Prevention System (IPS) signatures

💡 AI-generated — review with a security professional before acting.View on NVD →
Post Views: 7

Site map

  • About Us
  • Privacy Policy
  • Terms & Conditions of Use
©2026 | Design: Newspaperly WordPress Theme