CVE-2026-1540

| EUVD-2026-18128 HIGH
2026-04-02 WPScan GHSA-76vr-6c8c-grfj
7.2
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
PoC Detected
Apr 03, 2026 - 16:10 vuln.today
Public exploit code
Analysis Generated
Apr 02, 2026 - 06:15 vuln.today
EUVD ID Assigned
Apr 02, 2026 - 06:15 euvd
EUVD-2026-18128
CVE Published
Apr 02, 2026 - 06:00 nvd
HIGH 7.2

Description

The Spam Protect for Contact Form 7 WordPress plugin before 1.2.10 allows logging to a PHP file, which could allow an attacker with editor access to achieve Remote Code Execution by using a crafted header

Analysis

Remote code execution in Spam Protect for Contact Form 7 WordPress plugin before version 1.2.10 allows authenticated users with editor-level privileges to achieve arbitrary code execution by crafting malicious headers that are logged to a PHP file. The vulnerability is publicly exploitable with proof-of-concept code available, making it a critical risk for WordPress installations using affected plugin versions.

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

56
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: +20

Share

CVE-2026-1540 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy