The article discusses a critical Remote Code Execution (RCE) vulnerability in the Kali Forms WordPress plugin, which was actively exploited by attackers starting from March 20th, 2026. Here are the key points:
-
Vulnerability Details:
- The vulnerability allows attackers to achieve authentication bypass and gain access to administrator accounts.
- It affects versions of the Kali Forms plugin prior to 2.4.10.
-
Impact:
- Over 312,200 exploit attempts have been blocked by the Wordfence firewall since the vulnerability was disclosed.
- The attackers started targeting websites immediately after the disclosure on March 20th, with a peak in activity between April 4th and 10th.
-
Attack Data:
- Attackers use specific IP addresses to exploit the vulnerability. Top offending IPs include 209.146.60.26 (over 152,000 blocked requests), 49.156.40.126 (over 50,000 blocked requests), and others.
- The exploit involves sending a request
Read the full article at Malware Analysis, News and Indicators - Latest topics
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



