Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-25863

Summary
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
Published At-04 May, 2026 | 18:29
Updated At-05 May, 2026 | 14:55
Rejected At-
Credits

Conditional Fields for Contact Form 7 < 2.7.3 DoS via Uncontrolled Resource Consumption

Conditional Fields for Contact Form 7 WordPress plugin through version 2.6.7 contains an uncontrolled resource consumption vulnerability in the Wpcf7cfMailParser class where the hide_hidden_mail_fields_regex_callback() method reads an iteration count directly from user-supplied POST parameters without validation or upper bound enforcement. Unauthenticated attackers can supply an arbitrarily large integer value through the REST API endpoint to cause unbounded loop execution with multiple preg_replace() operations, exhausting server memory and crashing the PHP process.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:VulnCheck
Assigner Org ID:83251b91-4cc7-4094-a5c7-464a1b83ea10
Published At:04 May, 2026 | 18:29
Updated At:05 May, 2026 | 14:55
Rejected At:
â–¼CVE Numbering Authority (CNA)
Conditional Fields for Contact Form 7 < 2.7.3 DoS via Uncontrolled Resource Consumption

Conditional Fields for Contact Form 7 WordPress plugin through version 2.6.7 contains an uncontrolled resource consumption vulnerability in the Wpcf7cfMailParser class where the hide_hidden_mail_fields_regex_callback() method reads an iteration count directly from user-supplied POST parameters without validation or upper bound enforcement. Unauthenticated attackers can supply an arbitrarily large integer value through the REST API endpoint to cause unbounded loop execution with multiple preg_replace() operations, exhausting server memory and crashing the PHP process.

Affected Products
Vendor
Jules Colle
Product
Conditional Fields for Contact Form 7
Default Status
affected
Versions
Affected
  • From 0 before 2.7.3 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-1284CWE-1284 Improper Validation of Specified Quantity in Input
Type: CWE
CWE ID: CWE-1284
Description: CWE-1284 Improper Validation of Specified Quantity in Input
Metrics
VersionBase scoreBase severityVector
4.08.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Rahul Karne
finder
VulnCheck
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://wordpress.org/plugins/cf7-conditional-fields/#developers
release-notes
patch
https://www.vulncheck.com/advisories/conditional-fields-for-contact-form-7-dos-via-uncontrolled-resource-consumption
third-party-advisory
Hyperlink: https://wordpress.org/plugins/cf7-conditional-fields/#developers
Resource:
release-notes
patch
Hyperlink: https://www.vulncheck.com/advisories/conditional-fields-for-contact-form-7-dos-via-uncontrolled-resource-consumption
Resource:
third-party-advisory
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:disclosure@vulncheck.com
Published At:04 May, 2026 | 19:16
Updated At:05 May, 2026 | 19:47

Conditional Fields for Contact Form 7 WordPress plugin through version 2.6.7 contains an uncontrolled resource consumption vulnerability in the Wpcf7cfMailParser class where the hide_hidden_mail_fields_regex_callback() method reads an iteration count directly from user-supplied POST parameters without validation or upper bound enforcement. Unauthenticated attackers can supply an arbitrarily large integer value through the REST API endpoint to cause unbounded loop execution with multiple preg_replace() operations, exhausting server memory and crashing the PHP process.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-1284Primarydisclosure@vulncheck.com
CWE ID: CWE-1284
Type: Primary
Source: disclosure@vulncheck.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://wordpress.org/plugins/cf7-conditional-fields/#developersdisclosure@vulncheck.com
N/A
https://www.vulncheck.com/advisories/conditional-fields-for-contact-form-7-dos-via-uncontrolled-resource-consumptiondisclosure@vulncheck.com
N/A
Hyperlink: https://wordpress.org/plugins/cf7-conditional-fields/#developers
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://www.vulncheck.com/advisories/conditional-fields-for-contact-form-7-dos-via-uncontrolled-resource-consumption
Source: disclosure@vulncheck.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

54Records found

CVE-2025-43972
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.09% / 24.61%
||
7 Day CHG~0.00%
Published-21 Apr, 2025 | 00:00
Updated-08 May, 2025 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in GoBGP before 3.35.0. An attacker can cause a crash in the pkg/packet/bgp/bgp.go flowspec parser by sending fewer than 20 bytes in a certain context.

Action-Not Available
Vendor-osrgGoBGP
Product-gobgpGoBGP
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2025-3511
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 27.80%
||
7 Day CHG~0.00%
Published-25 Apr, 2025 | 05:14
Updated-24 Apr, 2026 | 07:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation CC-Link IE TSN Remote I/O module, CC-Link IE TSN Analog-Digital Converter module, CC-Link IE TSN Digital-Analog Converter module, CC-Link IE TSN FPGA module, CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY, MELSEC iQ-R Series CC-Link IE TSN Master/Local Module, MELSEC iQ-R Series Ethernet Interface Module, CC-Link IE TSN Master/Local Station Communication LSI CP610, MELSEC iQ-F Series FX5 CC-Link IE TSN Master/Local Module, MELSEC iQ-F Series FX5 Ethernet Module, and MELSEC iQ-F Series FX5-ENET/IP Ethernet Module allows a remote unauthenticated attacker to cause a Denial of Service condition in the products by sending specially crafted UDP packets.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-CC-Link IE TSN Remote I/O module NZ2GN2B1-32DCC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY NZ2GACP620-300MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IPCC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY NZ2GACP620-60CC-Link IE TSN Remote I/O module NZ2GN2S1-32DTMELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-SXCC-Link IE TSN Remote I/O module NZ2GNCE3-32DCC-Link IE TSN Remote I/O module NZ2GN2B1-32TECC-Link IE TSN Analog-Digital Converter module NZ2GN2B-60AD4CC-Link IE TSN Digital-Analog Converter module NZ2GN2S-60DA4CC-Link IE TSN Remote I/O module NZ2GN2B1-32DTMELSEC iQ-R Series Ethernet Interface Module RJ71EN71CC-Link IE TSN Remote I/O module NZ2GN2B1-16TECC-Link IE TSN Remote I/O module NZ2GNCF1-32DCC-Link IE TSN Remote I/O module NZ2GN12A2-16TECC-Link IE TSN Remote I/O module NZ2GN2S1-16TECC-Link IE TSN FPGA module NZ2GN2S-D41PD02CC-Link IE TSN Remote I/O module NZ2GN2B1-32DTECC-Link IE TSN Remote I/O module NZ2GNCF1-32TCC-Link IE TSN Remote I/O module NZ2GN2S1-32TCC-Link IE TSN Remote I/O module NZ2GN2S1-32DCC-Link IE TSN Remote I/O module NZ2GN2B1-32TCC-Link IE TSN Remote I/O module NZ2GN2S1-16DMELSEC iQ-F Series FX5 CC-Link IE TSN Master/Local Module FX5-CCLGN-MSCC-Link IE TSN Analog-Digital Converter module NZ2GN2S-60AD4MELSEC iQ-F Series FX5 Ethernet Module FX5-ENETCC-Link IE TSN Remote I/O module NZ2GN2S1-32DTEMELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-EIPCC-Link IE TSN Remote I/O module NZ2GN12A4-16DECC-Link IE TSN Remote I/O module NZ2GN2S1-32TECC-Link IE TSN Remote I/O module NZ2GN2B1-16TCC-Link IE TSN FPGA module NZ2GN2S-D41D01CC-Link IE TSN Remote I/O module NZ2GN2S1-16TCC-Link IE TSN Remote I/O module NZ2GN12A42-16DTECC-Link IE TSN Remote I/O module NZ2GN12A42-16DTCC-Link IE TSN FPGA module NZ2GN2S-D41P01MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-T2CC-Link IE TSN Remote I/O module NZ2GN2B1-16DCC-Link IE TSN Master/Local Station Communication LSI CP610 NZ2GACP610-60CC-Link IE TSN Remote I/O module NZ2GN12A2-16TCC-Link IE TSN Remote I/O module NZ2GN12A4-16DCC-Link IE TSN Digital-Analog Converter module NZ2GN2B-60DA4CC-Link IE TSN Master/Local Station Communication LSI CP610 NZ2KT-NPETNG51CC-Link IE TSN Remote I/O module NZ2GNCE3-32DT
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2021-28510
Matching Score-4
Assigner-Arista Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Arista Networks, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.57% / 68.54%
||
7 Day CHG~0.00%
Published-24 Jan, 2023 | 00:00
Updated-01 Apr, 2025 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable.

For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable.

Action-Not Available
Vendor-Arista Networks, Inc.
Product-7060sx2-48yc67050qx-32s7304x37150s-647500r27260qx7500r3-36cq7300x-64t7800r3k-48cq7060cx-32s7328x7500r37300x-64s7250qx-647050sx3-48yc7050sx3-48yc87060dx4-32720xp-24y67280sr3k-48yc87300x3-32c7260cx7150s-247320x-32c7512r3720xp-24zy47260cx37170-64c7804r37050sx-72q7280e7050cx3-32s7050sx2-72qeos7150sc-247050sx2-1287260cx3-647504r37020r7150s-527300x3-48yc47050sx-647170-32c720xp-48zc2720xp-96zc27050sx3-48yc12720xp-48y67500r3-24d7500r3-24p7800r3-48cq7300x-32q7500r7170-32cd7050cx3m-32s7368x47050sx-1287050tx-647050tx3-48c87050tx-72q7060px4-327280r37150sc-647280r7060cx2-32s7050tx-487050qx2-32s7500r3k-36cq7508r37500e7800r3-36p7808r37050tx2-1287308x37050sx3-96yc87280r27324x7050sx3-48c87280sr3-48yc8EOS
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2025-32415
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.9||LOW
EPSS-0.07% / 21.52%
||
7 Day CHG-0.01%
Published-17 Apr, 2025 | 00:00
Updated-03 Nov, 2025 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.

Action-Not Available
Vendor-libxml2 (XMLSoft)
Product-libxml2libxml2
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
  • Previous
  • 1
  • 2
  • Next
Details not found