CVSS 7.2CVE-2026-1540

CVE-2026-1540: RCE in Spam Protect for Contact Form 7

CVE-2026-1540 details: Remote Code Execution vulnerability in Spam Protect for Contact Form 7 WordPress plugin before 1.2.10. Update now!

Published on

A Remote Code Execution (RCE) vulnerability, identified as CVE-2026-1540, affects the Spam Protect for Contact Form 7 WordPress plugin. This flaw allows an attacker with editor access to execute arbitrary code on the server. Users are advised to update to version 1.2.10 immediately.

With a CVSS score of 7.2, this is a high-severity vulnerability because it allows code execution.

What is Wordpress?

Wordpress is a popular open-source content management system (CMS) used to create and manage websites and blogs. It is written in PHP and paired with a MySQL or MariaDB database. Wordpress is highly extensible through the use of themes and plugins, allowing users to customize the appearance and functionality of their sites. To learn more, you can search all wordpress CVEs.

CVE-2026-1540: Remote Code Execution in Spam Protect for Contact Form 7

CVSS7.2
Affected versionsUsers running the Spam Protect for Contact Form 7 WordPress plugin on versions prior to 1.2.10 are affected. The attacker needs editor access to exploit this vulnerability.

High severity due to potential for remote code execution.

EPSS score of 0.079 indicates a low probability of exploitation.

The Spam Protect for Contact Form 7 WordPress plugin before version 1.2.10 is vulnerable to Remote Code Execution (RCE). An attacker with editor access can exploit this by logging to a PHP file using a crafted header, leading to arbitrary code execution on the server.

How to fix CVE-2026-1540 in Spam Protect for Contact Form 7

Patch immediately
  1. 1.Update the Spam Protect for Contact Form 7 plugin to version 1.2.10 or later.

Workaround: Disable the plugin until the update can be applied. Restrict editor access to trusted users only.

NextGuard automatically flags CVE-2026-1540 if Spam Protect for Contact Form 7 appears in any of your monitored projects — no manual lookup required.

Stay ahead of Wordpress vulnerabilities

Proactively detect and respond to security threats in your Wordpress deployments. monitor your wordpress dependencies for early warnings.

Compare Plans

Frequently asked questions

The Remote Code Execution vulnerability in Spam Protect for Contact Form 7 highlights the importance of keeping WordPress plugins up to date. Regularly auditing your WordPress plugins and themes is crucial for maintaining a secure website. see all wordpress vulnerabilities.

Related topics

wordpressplugin vulnerabilityremote code executionsecurity updatecve