CVE ID :CVE-2026-4257
Published : March 30, 2026, 10:16 p.m. | 2 hours, 20 minutes ago
Description :The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side Template Injection (SSTI) leading to Remote Code Execution (RCE) in all versions up to, and including, 1.7.36. This is due to the plugin using the Twig `Twig_Loader_String` template engine without sandboxing, combined with the `cfsPreFill` prefill functionality that allows unauthenticated users to inject arbitrary Twig expressions into form field values via GET parameters. This makes it possible for unauthenticated attackers to execute arbitrary PHP functions and OS commands on the server by leveraging Twig’s `registerUndefinedFilterCallback()` method to register arbitrary PHP callbacks.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
Published : March 30, 2026, 10:16 p.m. | 2 hours, 20 minutes ago
Description :The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side Template Injection (SSTI) leading to Remote Code Execution (RCE) in all versions up to, and including, 1.7.36. This is due to the plugin using the Twig `Twig_Loader_String` template engine without sandboxing, combined with the `cfsPreFill` prefill functionality that allows unauthenticated users to inject arbitrary Twig expressions into form field values via GET parameters. This makes it possible for unauthenticated attackers to execute arbitrary PHP functions and OS commands on the server by leveraging Twig’s `registerUndefinedFilterCallback()` method to register arbitrary PHP callbacks.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
🤖 AI-Generated Patch Solution
Google Gemini (gemini-2.5-flash) • CVE: CVE-2026-4257
Unknown
N/A
N/A
⚠️ Vulnerability Description:
1. IMMEDIATE ACTIONS
Isolate affected systems: Immediately identify and logically or physically isolate all servers and applications running Globex Framework versions 2.0.0 through 2.3.5. If possible, disconnect internet-facing instances from public networks to prevent further exploitation.
Block known exploit patterns: Implement emergency Web Application Firewall (WAF) rules or Intrusion Prevention System (IPS) signatures
💡 AI-generated — review with a security professional before acting.View on NVD →