Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

766+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-39440: FunnelFormsPro WordPress Plugin Remote Code Inclusion (CVSS 9.9)
CVE-2026-39440: FunnelFormsPro WordPress Plugin Remote Code Inclusion (CVSS 9.9)

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-39440

CVE-2026-39440: FunnelFormsPro WordPress Plugin Remote Code Inclusion (CVSS 9.9)

A critical code injection vulnerability in the FunnelFormsPro WordPress plugin through version 3.8.1 allows remote code inclusion, enabling attackers to load and execute arbitrary remote PHP files on vulnerable WordPress sites.

Dylan H.

Security Team

April 24, 2026
4 min read

Affected Products

  • FunnelFormsPro by Funnelforms LLC — versions up to and including 3.8.1

Overview

CVE-2026-39440 is a critical code injection vulnerability in FunnelFormsPro, a WordPress plugin developed by Funnelforms LLC. The vulnerability allows remote code inclusion (RCI), enabling attackers to force the vulnerable WordPress installation to fetch and execute a PHP file from an attacker-controlled remote server. With a CVSS score of 9.9, this is one of the most severe plugin vulnerabilities seen in the WordPress ecosystem.

FieldDetails
CVE IDCVE-2026-39440
CVSS Score9.9 (Critical)
VendorFunnelforms LLC
ProductFunnelFormsPro
Affected Versionsn/a through 3.8.1
Fixed VersionUpdate to latest version immediately
Attack VectorNetwork
CWECWE-94 — Improper Control of Generation of Code
Published2026-04-23

Technical Details

Remote file inclusion (RFI) vulnerabilities occur when a PHP application dynamically includes files based on user-supplied input without adequate validation or restriction. In FunnelFormsPro through 3.8.1, an attacker can supply a URL pointing to a malicious PHP script hosted on an external server. The WordPress server then fetches and executes that remote file as if it were trusted local code.

This attack requires PHP's allow_url_include directive to be enabled (which is off by default in modern PHP installations, but may be enabled in shared hosting or legacy environments). Even without allow_url_include, variations of this vulnerability class may still achieve local file inclusion, data disclosure, or path traversal impacts.

Attack Flow

  1. Attacker identifies a WordPress site running FunnelFormsPro ≤ 3.8.1
  2. Attacker hosts a malicious PHP payload on an external server they control
  3. Attacker sends a crafted request to the vulnerable FunnelFormsPro endpoint, supplying the remote URL as a parameter
  4. The plugin fetches and includes the remote file server-side
  5. The malicious PHP executes in the context of the WordPress server, enabling full RCE, credential theft, or web shell installation

Why 9.9 and Not 10.0

The CVSS 9.9 score (rather than the maximum 10.0) typically indicates that at least one attack vector factor has a slight constraint — in this case, likely the PHP configuration requirement for allow_url_include in the strictest RFI exploitation path, or a minor privilege requirement. In practice, the impact is functionally equivalent to full unauthenticated RCE.

Impact

A successful exploit of CVE-2026-39440 allows an attacker to:

  • Execute arbitrary PHP code on the web server
  • Install web shells for persistent backdoor access
  • Steal WordPress credentials, database credentials (from wp-config.php), and all site data
  • Pivot to other services or databases accessible from the server
  • Deface or destroy the WordPress site
  • Leverage the server as a botnet node, spam relay, or cryptominer

Affected Deployments

FunnelFormsPro is a commercial WordPress plugin used to create conversion-focused forms and funnels within WordPress. Organizations using this plugin for lead capture, opt-in forms, or marketing funnels on versions 3.8.1 and below should treat this as an urgent remediation priority.

Remediation

  1. Update immediately to the latest version of FunnelFormsPro from Funnelforms LLC — check the plugin repository or vendor's dashboard for a patched release
  2. If no patch is yet available, deactivate and remove the plugin until a fix is issued
  3. Audit web server logs for suspicious outbound HTTP requests that may indicate prior exploitation
  4. Review WordPress file system for unexpected PHP files in the uploads directory or plugin folders that may indicate web shell installation
  5. Rotate all credentials stored in wp-config.php, including database passwords
  6. Ensure allow_url_include is set to Off in your PHP configuration as a defense-in-depth measure

Workaround

Disable the FunnelFormsPro plugin entirely until a patched version is confirmed available. This eliminates the attack surface while a permanent fix is applied.

References

  • NVD — CVE-2026-39440
#CVE#WordPress#Code Injection#Remote File Inclusion#Plugin Vulnerability

Related Articles

CVE-2026-3844 — Breeze Cache WordPress Plugin Unauthenticated File Upload

A critical unauthenticated file upload vulnerability in the Breeze Cache WordPress plugin allows attackers to upload arbitrary files to affected servers without authentication, enabling full remote code execution. CVSS 9.8.

6 min read

CVE-2026-32613: Spinnaker Echo Spring Expression Language Injection (CVSS 9.9)

A critical code injection flaw in Spinnaker's Echo service allows unrestricted Spring Expression Language (SPeL) execution via artifact processing, enabling full remote code execution on affected deployments.

4 min read

CVE-2026-39918: Vvveb CMS Unauthenticated PHP Code Injection via Install Endpoint

Vvveb CMS versions prior to 1.0.8.1 allow unauthenticated attackers to inject arbitrary PHP code through the installation endpoint's unsanitized subdir parameter, enabling full remote code execution.

4 min read
Back to all Security Alerts