Impact
The Contact Form by Supsystic plugin for WordPress contains a Server‑Side Template Injection flaw that permits an unauthenticated attacker to inject and execute arbitrary Twig expressions. This vulnerability exposes the server to remote code execution, allowing execution of PHP functions and operating‑system commands. The weakness reflects code injection (CWE‑94).
Affected Systems
All WordPress installations using the Contact Form by Supsystic plugin version 1.7.36 or earlier are affected; the issue remains within the entire range of supported releases up to and including 1.7.36. The plugin is distributed by supsystic.com and is commonly embedded via their WordPress plugin.
Risk and Exploitability
The CVSS base score is 9.8, indicating critical severity. No EPSS score is published and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it over any public site without authentication by supplying crafted GET parameters to the prefill endpoint, triggering the Twig engine to process the injected template and run code. The exploitability is high and exhibits immediate remote code execution potential.
OpenCVE Enrichment