Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1257: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in shazdeh Administrative Shortcodes

0
High
VulnerabilityCVE-2026-1257cvecve-2026-1257cwe-98
Published: Sat Jan 24 2026 (01/24/2026, 07:26:39 UTC)
Source: CVE Database V5
Vendor/Project: shazdeh
Product: Administrative Shortcodes

Description

The Administrative Shortcodes plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 0.3.4 via the 'slug' attribute of the 'get_template' shortcode. This is due to insufficient path validation on user-supplied input passed to the get_template_part() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other "safe" file types can be uploaded and included.

AI-Powered Analysis

AILast updated: 01/31/2026, 09:01:03 UTC

Technical Analysis

CVE-2026-1257 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Administrative Shortcodes plugin for WordPress in all versions up to and including 0.3.4. The vulnerability stems from insufficient sanitization and validation of user input passed via the 'slug' attribute of the 'get_template' shortcode. This input is directly used in the get_template_part() function without proper path restrictions, enabling an authenticated attacker with Contributor-level privileges or higher to manipulate the file path and include arbitrary files from the server. Because WordPress allows uploading of certain file types like images, attackers can upload PHP code disguised as safe file types and then include these files to execute arbitrary PHP code. This leads to a critical security breach, allowing attackers to bypass access controls, execute arbitrary code, and potentially extract sensitive information from the server. The vulnerability requires authentication but no user interaction, and the attack vector is remote over the network. The CVSS v3.1 score is 7.5 (High), reflecting the network attack vector, low complexity, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability's nature makes it a prime target for exploitation once weaponized. The plugin is used in WordPress environments, which are widely deployed across many European organizations, especially in SMEs and content-driven websites.

Potential Impact

For European organizations, this vulnerability can have severe consequences. Exploitation can lead to full server compromise, allowing attackers to execute arbitrary code, escalate privileges, and access or modify sensitive data. This can disrupt business operations, lead to data breaches involving personal or financial information, and damage organizational reputation. Given the widespread use of WordPress in Europe, especially among small and medium enterprises, media, and governmental websites, the risk of exploitation is significant. Attackers could leverage this vulnerability to establish persistent backdoors, pivot within networks, or conduct further attacks such as ransomware deployment. The requirement for Contributor-level access reduces the attack surface but does not eliminate risk, as many sites allow user registrations or have multiple contributors. The lack of public exploits currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Immediate upgrade or patching: Organizations should update the Administrative Shortcodes plugin to a version that addresses this vulnerability once available. If no patch exists, consider disabling or removing the plugin until a fix is released. 2. Restrict user privileges: Limit Contributor-level access strictly to trusted users and review existing user roles to minimize the number of users who can exploit this vulnerability. 3. Implement Web Application Firewall (WAF) rules: Deploy WAF rules to detect and block attempts to exploit the 'slug' parameter in the 'get_template' shortcode, focusing on suspicious path traversal or inclusion patterns. 4. Harden file upload controls: Enforce strict validation and sanitization of uploaded files, disallowing executable code disguised as images or other safe file types. 5. Monitor logs and alerts: Continuously monitor server and application logs for unusual file inclusion attempts or unexpected PHP file executions. 6. Employ file integrity monitoring: Use tools to detect unauthorized changes or additions to PHP files in the WordPress installation. 7. Conduct regular security audits: Review all plugins and themes for vulnerabilities and remove or replace unsupported or unmaintained components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-20T19:59:34.956Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697476614623b1157ca73aa2

Added to database: 1/24/2026, 7:36:01 AM

Last enriched: 1/31/2026, 9:01:03 AM

Last updated: 2/7/2026, 8:43:00 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats