Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0926: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in prodigycommerce Prodigy Commerce

0
Critical
VulnerabilityCVE-2026-0926cvecve-2026-0926cwe-98
Published: Thu Feb 19 2026 (02/19/2026, 04:36:24 UTC)
Source: CVE Database V5
Vendor/Project: prodigycommerce
Product: Prodigy Commerce

Description

The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.9 via the 'parameters[template_name]' parameter. This makes it possible for unauthenticated attackers to include and read arbitrary files or execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

AI-Powered Analysis

AILast updated: 02/19/2026, 05:10:56 UTC

Technical Analysis

CVE-2026-0926 is a critical vulnerability classified under CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Programs) affecting the Prodigy Commerce plugin for WordPress. The flaw exists in the handling of the 'parameters[template_name]' parameter, which is improperly sanitized, allowing unauthenticated attackers to perform Local File Inclusion (LFI). This vulnerability enables attackers to include arbitrary files from the server or uploaded content, potentially executing malicious PHP code. Since the plugin accepts certain file types like images, attackers may upload files with embedded PHP code disguised as safe types and then include them via the vulnerable parameter, achieving remote code execution (RCE). The vulnerability impacts all versions up to and including 3.2.9. The CVSS v3.1 score of 9.8 reflects its critical nature, with attack vector being network-based, no privileges required, and no user interaction needed. The consequences include full system compromise, data theft, and service disruption. No official patches or fixes are currently published, and no exploits have been observed in the wild yet, but the vulnerability is publicly disclosed and poses an imminent threat to unpatched systems.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WordPress with the Prodigy Commerce plugin, this vulnerability presents a severe risk. Exploitation can lead to unauthorized access to sensitive customer data, including payment information, personally identifiable information (PII), and business-critical data. Attackers could deploy web shells or backdoors, facilitating persistent access and lateral movement within corporate networks. This could result in data breaches, financial fraud, reputational damage, and regulatory penalties under GDPR. The availability of affected systems could also be compromised, disrupting online sales and customer trust. Given the widespread use of WordPress and e-commerce plugins in Europe, the threat surface is significant. Organizations in sectors such as retail, finance, and healthcare are particularly vulnerable due to the value of their data and the critical nature of their online services.

Mitigation Recommendations

1. Immediate action should include disabling or removing the Prodigy Commerce plugin until a vendor patch is released. 2. Monitor and restrict the 'parameters[template_name]' parameter at the web application firewall (WAF) level to block suspicious file inclusion attempts. 3. Implement strict file upload validation to prevent uploading of files with embedded PHP code, including enforcing MIME type checks and file extension whitelisting. 4. Employ runtime application self-protection (RASP) or intrusion detection systems to detect anomalous file access patterns. 5. Regularly audit server file systems and web directories for unauthorized or suspicious files. 6. Harden PHP configurations by disabling dangerous functions such as include(), require(), and allow_url_include where possible. 7. Maintain up-to-date backups and ensure incident response plans are ready to mitigate potential exploitation. 8. Educate development and security teams about secure coding practices to prevent similar vulnerabilities in custom plugins or themes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-13T21:22:20.386Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699697f56aea4a407a3be0e2

Added to database: 2/19/2026, 4:56:21 AM

Last enriched: 2/19/2026, 5:10:56 AM

Last updated: 2/19/2026, 8:49:41 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats