The last 48 hours have been quiet on new WordPress vulnerability disclosures โ€” no fresh CVEs from Wordfence, WPScan, Sucuri, or WordPress.org. But quiet doesn’t mean safe.

The Real Story: CVE-2026-3584 Exploitation Is Exploding

Kali Forms, a WordPress drag-and-drop form builder, contains one of the most aggressively exploited vulnerabilities active today. CVE-2026-3584 is a CVSS 9.8 unauthenticated Remote Code Execution flaw affecting all plugin versions up to and including 2.4.9.

How it works โ€” in plain English:

You submit a contact form on any WordPress site running Kali Forms โ‰ค 2.4.9

The plugin takes your form input and passes it directly into PHP’s call_user_func() โ€” a function that runs whatever name you give it

No login. No admin access. One request = full server takeover

How bad is it right now?

Exploitation began the same day the CVE was published โ€” March 20, 2026

By March 30: attack attempts surged from 438 to 10,600+ โ€” a 64ร— spike in one week

~15% of attacks routed through Tor to mask attacker IPs

Attackers are deploying webshells, credential stealers, and full admin takeovers

Don’t Sleep On This Either: Ninja Forms CVE-2026-0740

Ninja Forms โ€“ File Uploads (โ‰ค 3.3.26) carries the same CVSS 9.8 score. Unauthenticated attackers can upload arbitrary files via an unprotected AJAX handler โ€” instant RCE. Affects ~50,000 sites. Update to 3.3.27 immediately.

How SwissWPSuite (v2.9.27.61) Shields Your Sites

Threat Vector SwissWPSuite Defense Layer
Threat Vector SwissWPSuite Defense Layer
PHP webshell upload PHP-in-Uploads WAF blocking + .htaccess deny in /uploads WAF + Hardening
call_user_func RCE 38-pattern Command Injection detection in WAF (Pro) WAF L1
Webshell detection post-upload 18 filename patterns + 24 malware signature scans Sentinel M1-B/M1-C
Vulnerable plugin detection WPScan API CVE matching with version verification Sentinel M4-D2
IP-based attack campaigns Progressive IP banning (5 violations/10 min โ†’ 30-min ban) WAF IP Reputation
Admin takeover attempts Brute force lockout + TOTP-based 2FA (Pro) Login Security
Immediate Action Items:

Update Kali Forms to 2.4.10 right now โ€” no exceptions

Update Ninja Forms โ€“ File Uploads to 3.3.27 if installed

Run a full SwissWPSuite Sentinel scan โ€” M1 modules will flag any PHP files already dropped in /uploads

Enable PHP-in-Uploads hardening in SwissWPSuite (Pro) to block server-side PHP execution from the upload directory at the .htaccess level

Quiet periods = audit time โ€” review admin accounts, check for excessive admin users (Sentinel M4-G2 flags this)