CVE-2026-2442
CRLF Injection in Pagelayer Plugin Enables Email Header Injection
Publication date: 2026-03-28
Last updated on: 2026-03-28
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pagelayer | pagelayer | to 2.0.7 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-93 | The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate the CVE-2026-2442 vulnerability in the Pagelayer WordPress plugin, you should immediately update the plugin to version 2.0.8 or later, which includes security fixes addressing this issue.
- Update Pagelayer plugin to version 2.0.8 or newer.
- Ensure the contact form's "Reply-To" email header is sanitized to prevent CRLF injection.
- Restrict low-level users from adding custom templates in the contact form to reduce risk.
- Verify that input fields, especially email parameters, are properly sanitized to strip CRLF characters.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to inject arbitrary email headers via the contact form, potentially enabling email spoofing or abuse of email delivery.
Such email header injection vulnerabilities can lead to unauthorized disclosure or misuse of email communications, which may impact compliance with standards like GDPR or HIPAA that require protection of personal data and secure communication.
However, the provided context does not explicitly state the direct impact on compliance with these regulations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves CRLF injection via the 'email' parameter in the contact form of the Pagelayer WordPress plugin up to version 2.0.7. Detection can focus on identifying attempts to inject CRLF characters into email headers through this parameter.
One approach is to monitor HTTP requests to the contact form endpoint for suspicious payloads containing CR (\r) and LF (\n) characters or their URL-encoded equivalents (%0d, %0a) in the 'email' parameter.
Example commands to detect such attempts include using network traffic inspection tools like tcpdump or tshark to filter HTTP POST requests containing these characters, or using grep on web server logs to find suspicious input.
- Using grep on web server access logs to find CRLF injection attempts in the 'email' parameter: grep -iE 'email=.*(%0d|%0a|\r|\n)' /var/log/apache2/access.log
- Using tshark to capture HTTP POST requests containing CRLF sequences in the 'email' parameter: tshark -Y 'http.request.method == "POST" && http.file_data matches "email=.*(%0d|%0a)"'
- Manually testing the contact form by submitting payloads with CRLF characters in the 'email' field and observing if email headers are manipulated or malformed.
Additionally, verifying the plugin version installed on your WordPress site can help determine if the vulnerability is present; versions up to 2.0.7 are vulnerable, while 2.0.8 includes fixes.
How can this vulnerability impact me? :
This vulnerability can be exploited by attackers to manipulate email headers in contact form submissions, potentially allowing them to send emails with forged headers such as Bcc or Cc.
Such manipulation can lead to abuse of the email delivery system, including spam distribution, email spoofing, or unauthorized disclosure of information via email.
Because the attack can be performed without authentication, it poses a risk to the integrity and trustworthiness of emails sent from the affected website.
Can you explain this vulnerability to me?
The vulnerability in the Page Builder: Pagelayer WordPress plugin (up to version 2.0.7) is an Improper Neutralization of CRLF Sequences, also known as CRLF Injection. It occurs because the contact form handler substitutes placeholders with attacker-controlled form fields and then inserts these values into email headers without removing carriage return and line feed (CR/LF) characters.
This flaw allows unauthenticated attackers to inject arbitrary email headers, such as Bcc or Cc, by exploiting the 'email' parameter in contact forms that use placeholders in mail template headers.