This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Critical Code Injection in WordPress plugin 'Contact Form by Supsystic'. π₯ **Consequences**: Unauthenticated attackers can inject arbitrary Twig expressions via GET parameters.β¦
π¦ **Affected Product**: Contact Form by Supsystic (WordPress Plugin). π **Versions**: Version **1.7.36 and earlier**. π’ **Vendor**: Supsystic.
Q4What can hackers do? (Privileges/Data)
βοΈ **Attacker Capabilities**: Full Remote Code Execution. π **Impact**: High Confidentiality, Integrity, and Availability loss (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). π **Privileges**: No authentication required.β¦
π **Self-Check**: Scan for WordPress sites running 'Contact Form by Supsystic' <= v1.7.36. π οΈ **Tooling**: Use Nuclei with the provided CVE-2026-4257 template. π **Manual**: Look for `cfsPreFill` functionality and unsandβ¦