A Remote Code Execution (RCE) vulnerability, identified as CVE-2026-1540, affects the Spam Protect for Contact Form 7 WordPress plugin. This flaw allows an attacker with editor access to execute arbitrary code on the server. Users are advised to update to version 1.2.10 immediately.
With a CVSS score of 7.2, this is a high-severity vulnerability because it allows code execution.
What is Wordpress?
CVE-2026-1540: Remote Code Execution in Spam Protect for Contact Form 7
High severity due to potential for remote code execution.
EPSS score of 0.079 indicates a low probability of exploitation.
The Spam Protect for Contact Form 7 WordPress plugin before version 1.2.10 is vulnerable to Remote Code Execution (RCE). An attacker with editor access can exploit this by logging to a PHP file using a crafted header, leading to arbitrary code execution on the server.
How to fix CVE-2026-1540 in Spam Protect for Contact Form 7
Patch immediately- 1.Update the Spam Protect for Contact Form 7 plugin to version 1.2.10 or later.
Workaround: Disable the plugin until the update can be applied. Restrict editor access to trusted users only.
NextGuard automatically flags CVE-2026-1540 if Spam Protect for Contact Form 7 appears in any of your monitored projects — no manual lookup required.
Stay ahead of Wordpress vulnerabilities
Proactively detect and respond to security threats in your Wordpress deployments. monitor your wordpress dependencies for early warnings.
Compare PlansFrequently asked questions
The Remote Code Execution vulnerability in Spam Protect for Contact Form 7 highlights the importance of keeping WordPress plugins up to date. Regularly auditing your WordPress plugins and themes is crucial for maintaining a secure website. see all wordpress vulnerabilities.
Related topics