Impact
A loop in the Wpcf7cfMailParser class of the Conditional Fields for Contact Form 7 plugin reads an iteration count directly from unauthenticated POST parameters supplied to the REST API endpoint without validation or an upper bound. This allows an attacker to provide an arbitrarily large integer, causing an infinite loop with many preg_replace() calls that consume server memory and ultimately crash the PHP process, resulting in a denial of service.
Affected Systems
The vulnerability affects WordPress sites running Jules Colle’s Conditional Fields for Contact Form 7 plugin through version 2.6.7. All installations older than 2.7.3 are susceptible.
Risk and Exploitability
The flaw requires no authentication and is triggered by a publicly reachable REST API endpoint. The published CVSS score of 8.7 indicates high severity, the EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the issue by submitting a large integer value in a POST request, making the vulnerability easy to deploy and potentially causing widespread service disruption.
OpenCVE Enrichment