PT-2026-29130 · WordPress · Contact Form By Supsystic
Azril Fathoni
·
Published
2026-03-30
·
Updated
2026-04-05
·
CVE-2026-4257
CVSS v3.1
9.8
Critical
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Contact Form by Supsystic plugin for WordPress versions up to and including 1.7.36
Description
The Contact Form by Supsystic plugin for WordPress is susceptible to Server-Side Template Injection (SSTI), which can lead to Remote Code Execution (RCE). This occurs because the plugin utilizes the Twig
Twig Loader String template engine without proper sandboxing. The cfsPreFill functionality allows unauthenticated users to inject arbitrary Twig expressions into form field values through GET parameters. Attackers can exploit the registerUndefinedFilterCallback() method within Twig to register arbitrary PHP callbacks, ultimately enabling the execution of PHP functions and operating system commands on the server.Recommendations
Update the Contact Form by Supsystic plugin to a version newer than 1.7.36.
Exploit
Fix
RCE
Code Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Contact Form By Supsystic