CVE-2026-25863
HIGH
8,7
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH
7,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
Description
AI Translation Available
Conditional Fields for Contact Form 7 WordPress plugin through version 2.6.7 contains an uncontrolled resource consumption vulnerability in the Wpcf7cfMailParser class where the hide_hidden_mail_fields_regex_callback() method reads an iteration count directly from user-supplied POST parameters without validation or upper bound enforcement. Unauthenticated attackers can supply an arbitrarily large integer value through the REST API endpoint to cause unbounded loop execution with multiple preg_replace() operations, exhausting server memory and crashing the PHP process.
1284
Improper Validation of Specified Quantity in Input
IncompleteCommon Consequences
Security Scopes Affected:
Other
Integrity
Availability
Potential Impacts:
Varies By Context
Dos: Resource Consumption (Cpu)
Modify Memory
Read Memory
Applicable Platforms
All platforms may be affected
https://wordpress.org/plugins/cf7-conditional-fields/#developers
https://www.vulncheck.com/advisories/conditional-fields-for-contact-form-7-dos-…