Home

Description

Conditional Fields for Contact Form 7 WordPress plugin through version 2.6.7 contains an uncontrolled resource consumption vulnerability in the Wpcf7cfMailParser class where the hide_hidden_mail_fields_regex_callback() method reads an iteration count directly from user-supplied POST parameters without validation or upper bound enforcement. Unauthenticated attackers can supply an arbitrarily large integer value through the REST API endpoint to cause unbounded loop execution with multiple preg_replace() operations, exhausting server memory and crashing the PHP process.

PUBLISHED Reserved 2026-02-06 | Published 2026-05-04 | Updated 2026-05-05 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-1284 Improper Validation of Specified Quantity in Input

Product status

Default status
affected

Any version before 2.7.3
affected

Credits

Rahul Karne finder

VulnCheck finder

References

wordpress.org/plugins/cf7-conditional-fields/ release-notes patch

www.vulncheck.com/...s-via-uncontrolled-resource-consumption third-party-advisory

cve.org (CVE-2026-25863)

nvd.nist.gov (CVE-2026-25863)

Download JSON