CVE-2026-25863: WordPress Plugin DoS Vulnerability Hits Contact Form 7
The National Vulnerability Database reports CVE-2026-25863, an uncontrolled resource consumption vulnerability in the Conditional Fields for Contact Form 7 WordPress plugin, affecting versions up to 2.6.7. This isn’t just a bug; it’s a direct path to server meltdown for unpatched systems. The flaw resides in the Wpcf7cfMailParser class, specifically the hide_hidden_mail_fields_regex_callback() method.
Attackers can exploit this via the REST API endpoint, supplying an arbitrarily large integer in POST parameters. Without validation or an upper bound, the method enters an unbounded loop with multiple preg_replace() operations. This rapidly exhausts server memory, crashing the PHP process and effectively taking the site offline. This is a denial-of-service attack that requires no authentication, making it particularly dangerous.
With a CVSS score of 7.5 (HIGH), this vulnerability is a critical concern for any organization running WordPress with this specific plugin. The attacker’s calculus here is simple: maximum disruption with minimal effort, leveraging a common plugin’s blind trust in user input.
What This Means For You
- If your organization uses the Conditional Fields for Contact Form 7 WordPress plugin, identify all instances running versions 2.6.7 or earlier. Patch immediately to the latest secure version. Failure to do so leaves your web infrastructure vulnerable to unauthenticated denial-of-service attacks that can crash your PHP processes and render your sites inaccessible.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-25863 | DoS | WordPress plugin: Conditional Fields for Contact Form 7 |
| CVE-2026-25863 | DoS | Affected version: through 2.6.7 |
| CVE-2026-25863 | DoS | Vulnerable class: Wpcf7cfMailParser |
| CVE-2026-25863 | DoS | Vulnerable method: hide_hidden_mail_fields_regex_callback() |
| CVE-2026-25863 | DoS | Attack vector: Unauthenticated POST parameters via REST API endpoint |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 04, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.