Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wpchill Wpchill kali Forms — Contact Form & Drag-and-drop Builder |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wpchill Wpchill kali Forms — Contact Form & Drag-and-drop Builder |
Fri, 20 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into internal placeholder storage, combined with the use of 'call_user_func' on these placeholder values. This makes it possible for unauthenticated attackers to execute code on the server. | |
| Title | Kali Forms <= 2.4.9 - Unauthenticated Remote Code Execution via form_process | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:59:18.586Z
Reserved: 2026-03-05T05:20:57.880Z
Link: CVE-2026-3584
Updated: 2026-03-23T16:51:32.295Z
Status : Deferred
Published: 2026-03-20T22:16:29.267
Modified: 2026-04-22T21:32:08.360
Link: CVE-2026-3584
No data.
OpenCVE Enrichment
Updated: 2026-05-02T00:45:30Z