Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1257: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in shazdeh Administrative Shortcodes

0
High
VulnerabilityCVE-2026-1257cvecve-2026-1257cwe-98
Published: Sat Jan 24 2026 (01/24/2026, 07:26:39 UTC)
Source: CVE Database V5
Vendor/Project: shazdeh
Product: Administrative Shortcodes

Description

The Administrative Shortcodes plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 0.3.4 via the 'slug' attribute of the 'get_template' shortcode. This is due to insufficient path validation on user-supplied input passed to the get_template_part() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other "safe" file types can be uploaded and included.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 19:01:16 UTC

Technical Analysis

CVE-2026-1257 is a Local File Inclusion vulnerability classified under CWE-98, found in the 'Administrative Shortcodes' WordPress plugin developed by shazdeh. The vulnerability exists in all versions up to and including 0.3.4 due to insufficient sanitization and validation of the 'slug' attribute passed to the get_template_part() function within the 'get_template' shortcode. This flaw allows authenticated users with Contributor-level permissions or higher to manipulate the file path parameter, enabling them to include arbitrary files from the server. Because WordPress allows users with Contributor roles to upload certain file types (e.g., images), attackers can upload PHP code disguised as safe files and then include and execute them via this vulnerability. The impact includes the ability to execute arbitrary PHP code on the server, bypass WordPress access controls, and potentially exfiltrate sensitive data or take full control of the affected server. The vulnerability requires network access and authenticated user privileges but does not require user interaction beyond authentication. The CVSS v3.1 base score is 7.5, reflecting high severity with network attack vector, high impact on confidentiality, integrity, and availability, and a requirement for low privileges. No public exploits have been reported yet, but the vulnerability's nature and ease of exploitation by authenticated users make it a significant risk for affected sites.

Potential Impact

The vulnerability allows attackers with Contributor-level access or higher to execute arbitrary PHP code on the web server hosting the vulnerable WordPress plugin. This can lead to full server compromise, including unauthorized access to sensitive data, modification or deletion of content, and disruption of service. Since Contributors typically have limited permissions, this vulnerability effectively escalates their privileges to remote code execution, bypassing normal WordPress access controls. Organizations running websites with this plugin are at risk of data breaches, defacement, malware deployment, and potential lateral movement within their network. The impact is especially critical for high-traffic or business-critical WordPress sites, where downtime or data loss can cause significant operational and reputational damage.

Mitigation Recommendations

1. Immediately update the 'Administrative Shortcodes' plugin to a version that patches this vulnerability once available. 2. If a patch is not yet released, restrict Contributor-level user permissions temporarily or disable the plugin until a fix is applied. 3. Implement strict input validation and sanitization on user-supplied parameters, especially those used in file inclusion functions. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to exploit the 'slug' parameter. 5. Monitor logs for unusual file inclusion attempts or unexpected file uploads that could indicate exploitation attempts. 6. Limit file upload types and scan uploaded files for malicious content to prevent uploading executable code disguised as images or other safe files. 7. Conduct regular security audits and penetration tests focusing on user privilege escalation and file inclusion vulnerabilities. 8. Harden the server environment by disabling unnecessary PHP functions and restricting file system permissions to limit the impact of potential code execution.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-20T19:59:34.956Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697476614623b1157ca73aa2

Added to database: 1/24/2026, 7:36:01 AM

Last enriched: 2/26/2026, 7:01:16 PM

Last updated: 3/25/2026, 4:34:29 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses