CVE-2026-3584
Published: 20 March 2026
Description
The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into internal placeholder storage, combined…
more
with the use of 'call_user_func' on these placeholder values. This makes it possible for unauthenticated attackers to execute code on the server.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents RCE by requiring validation and sanitization of user-supplied keys in form data before mapping to placeholders and invoking via call_user_func.
Mandates timely patching of the Kali Forms plugin vulnerability up to version 2.4.9, eliminating the flawed prepare_post_data and form_process functions.
Deploys malicious code protection mechanisms to scan for and block arbitrary code execution attempts exploiting the vulnerable plugin.
Security SummaryAI
CVE-2026-3584 is a Remote Code Execution vulnerability in the Kali Forms plugin for WordPress, affecting all versions up to and including 2.4.9. The flaw stems from the 'form_process' function, where the 'prepare_post_data' function directly maps user-supplied keys into internal placeholder storage, which is then processed via 'call_user_func' on these placeholder values. This enables arbitrary code execution on the server and is classified under CWE-94 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Unauthenticated attackers can exploit this vulnerability remotely with low attack complexity and no user interaction or privileges required. Exploitation allows attackers to execute arbitrary code on the affected server, potentially leading to full server compromise with high impacts on confidentiality, integrity, and availability.
Advisories and patch details are available via the provided references, including the vulnerable code at line 697 in class-form-processor.php of version 2.4.9, a fix in changeset 3487024, and Wordfence threat intelligence.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated remote code execution in a WordPress plugin, directly enabling exploitation of a public-facing web application.