<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Contact Form 7 WordPress Plugin — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/contact-form-7-wordpress-plugin/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 19:16:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/contact-form-7-wordpress-plugin/feed.xml" rel="self" type="application/rss+xml"/><item><title>Contact Form 7 WordPress Plugin Uncontrolled Resource Consumption Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-contact-form-7-resource-exhaustion/</link><pubDate>Mon, 04 May 2026 19:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-contact-form-7-resource-exhaustion/</guid><description>The Contact Form 7 WordPress plugin through version 2.6.7 is vulnerable to uncontrolled resource consumption, allowing unauthenticated attackers to exhaust server memory and crash the PHP process by supplying an arbitrarily large integer value to the REST API endpoint, leading to unbounded loop execution.</description><content:encoded><![CDATA[<p>The Contact Form 7 WordPress plugin, specifically versions up to 2.6.7, contains an uncontrolled resource consumption vulnerability (CVE-2026-25863) within the <code>Wpcf7cfMailParser</code> class. The <code>hide_hidden_mail_fields_regex_callback()</code> method is susceptible to unbounded loop execution due to reading an iteration count directly from user-supplied POST parameters via the REST API endpoint without proper validation. This allows unauthenticated attackers to send a large integer value, triggering multiple <code>preg_replace()</code> operations, leading to server memory exhaustion and crashing the PHP process. This vulnerability enables a denial-of-service condition, potentially impacting all websites using the vulnerable plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website using Contact Form 7 plugin version 2.6.7 or earlier.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the WordPress REST API endpoint.</li>
<li>The POST request includes a large integer value for the iteration count parameter, which is passed directly to the <code>hide_hidden_mail_fields_regex_callback()</code> method.</li>
<li>The <code>hide_hidden_mail_fields_regex_callback()</code> method, lacking input validation, reads the attacker-controlled integer.</li>
<li>The method initiates an unbounded loop, performing <code>preg_replace()</code> operations based on the attacker-supplied iteration count.</li>
<li>Each <code>preg_replace()</code> operation consumes server memory.</li>
<li>The excessive number of iterations rapidly exhausts available server memory.</li>
<li>The PHP process crashes due to memory exhaustion, resulting in a denial-of-service condition for the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition. Attackers can crash the PHP process on vulnerable WordPress websites by exhausting server memory. This can result in website downtime, impacting user experience and potentially leading to data loss or corruption. While the exact number of affected websites is unknown, the widespread use of Contact Form 7 makes this vulnerability a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Contact Form 7 WordPress plugin to a version greater than 2.6.7 to patch CVE-2026-25863.</li>
<li>Deploy the Sigma rule <code>Detect Contact Form 7 Uncontrolled Resource Consumption Attempt</code> to your SIEM to detect malicious POST requests targeting the WordPress REST API.</li>
<li>Monitor web server logs for abnormally large POST request sizes to the WordPress REST API endpoint, as this may indicate an attempted exploitation of CVE-2026-25863.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>resource-exhaustion</category><category>denial-of-service</category><category>cve-2026-25863</category></item></channel></rss>