Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1257: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in shazdeh Administrative Shortcodes

0
High
VulnerabilityCVE-2026-1257cvecve-2026-1257cwe-98
Published: Sat Jan 24 2026 (01/24/2026, 07:26:39 UTC)
Source: CVE Database V5
Vendor/Project: shazdeh
Product: Administrative Shortcodes

Description

CVE-2026-1257 is a high-severity Local File Inclusion (LFI) vulnerability in the WordPress plugin 'Administrative Shortcodes' by shazdeh, affecting all versions up to 0. 3. 4. It arises from insufficient validation of the 'slug' attribute in the 'get_template' shortcode, allowing authenticated users with Contributor-level access or higher to include and execute arbitrary files on the server. This can lead to remote code execution, bypassing access controls and exposing sensitive data. Exploitation requires authentication but no user interaction beyond that. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to the potential for full server compromise. The CVSS score is 7. 5, reflecting high impact but somewhat limited by the need for authenticated access and higher privileges. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this vulnerability to prevent exploitation.

AI-Powered Analysis

AILast updated: 01/24/2026, 07:50:15 UTC

Technical Analysis

CVE-2026-1257 is a Local File Inclusion vulnerability classified under CWE-98, found in the 'Administrative Shortcodes' WordPress plugin developed by shazdeh. The vulnerability exists in all versions up to and including 0.3.4, specifically in the handling of the 'slug' attribute of the 'get_template' shortcode. The plugin passes this user-supplied input to the WordPress function get_template_part() without adequate path validation or sanitization, enabling an attacker with Contributor-level or higher privileges to manipulate the file path. This manipulation allows inclusion of arbitrary files from the server, including those uploaded as images or other seemingly safe file types, which can contain malicious PHP code. Once included, this code executes with the privileges of the web server, potentially leading to remote code execution (RCE). The attacker can bypass access controls, access sensitive data, and compromise the integrity and availability of the affected system. The vulnerability requires authentication with at least Contributor privileges but does not require additional user interaction. The CVSS v3.1 score of 7.5 reflects a high severity due to the critical impact on confidentiality, integrity, and availability, although the attack complexity is high due to the need for authenticated access and some privilege level. No patches or exploits are currently publicly available, but the risk remains significant given the widespread use of WordPress and the plugin's presence in many environments.

Potential Impact

For European organizations, this vulnerability poses a serious threat to WordPress-based websites, especially those using the Administrative Shortcodes plugin. Successful exploitation can lead to full server compromise, allowing attackers to execute arbitrary PHP code, steal sensitive information, manipulate website content, or disrupt services. This can result in data breaches, defacement, loss of customer trust, regulatory penalties under GDPR, and operational downtime. Organizations in sectors such as e-commerce, government, healthcare, and media, which often rely on WordPress for content management, are particularly at risk. The requirement for Contributor-level access means that insider threats or compromised user accounts can be leveraged to exploit this vulnerability. Additionally, the ability to upload seemingly safe file types that can be included and executed increases the attack surface. The impact extends beyond the affected website to potentially compromise internal networks if the server is part of a larger infrastructure.

Mitigation Recommendations

1. Immediately update the Administrative Shortcodes plugin to a patched version once available. If no patch is currently released, consider temporarily disabling the plugin to eliminate the attack vector. 2. Restrict Contributor-level and higher access strictly to trusted users and enforce strong authentication mechanisms, including multi-factor authentication (MFA). 3. Implement strict file upload controls and validation to prevent uploading of files that could be executed as PHP, including disabling execution permissions in upload directories. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the 'slug' parameter or attempts to include arbitrary files. 5. Monitor logs for unusual file inclusion attempts or privilege escalations related to the plugin. 6. Conduct regular security audits and vulnerability scans focused on WordPress plugins and user privilege management. 7. Harden the server environment by disabling unnecessary PHP functions and restricting file system permissions to limit the impact of any successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-20T19:59:34.956Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697476614623b1157ca73aa2

Added to database: 1/24/2026, 7:36:01 AM

Last enriched: 1/24/2026, 7:50:15 AM

Last updated: 1/24/2026, 10:18:35 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats