CVE-2026-1988: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wpdecent Flexi Product Slider and Grid for WooCommerce
The Flexi Product Slider and Grid for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.0.5 via the `flexipsg_carousel` shortcode. This is due to the `theme` parameter being directly concatenated into a file path without proper sanitization or validation, allowing directory traversal. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server via the `theme` parameter granted they can create posts with shortcodes.
AI Analysis
Technical Summary
CVE-2026-1988 identifies a Local File Inclusion vulnerability in the wpdecent Flexi Product Slider and Grid for WooCommerce plugin for WordPress, present in all versions up to 1.0.5. The vulnerability stems from the 'theme' parameter in the flexipsg_carousel shortcode being directly concatenated into a file path without proper input validation or sanitization, enabling directory traversal attacks. Authenticated users with Contributor-level permissions or higher can exploit this by creating posts containing malicious shortcodes that manipulate the 'theme' parameter to include arbitrary PHP files from the server. This can lead to remote code execution, allowing attackers to execute arbitrary code with the web server's privileges. The vulnerability does not require user interaction beyond the attacker's own actions and has a CVSS 3.1 base score of 7.5, indicating high severity. The attack vector is network-based, but the complexity is high due to the need for authenticated access and crafting of malicious shortcodes. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is categorized under CWE-98, which covers improper control of filename for include/require statements in PHP programs, a common cause of remote file inclusion and code execution vulnerabilities in PHP-based applications.
Potential Impact
The impact of CVE-2026-1988 is significant for organizations running WordPress sites with the vulnerable Flexi Product Slider and Grid for WooCommerce plugin. Successful exploitation allows attackers with low-level authenticated access (Contributor or higher) to execute arbitrary PHP code on the server, potentially leading to full site compromise, data theft, defacement, or pivoting to internal networks. This threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized code execution and content modification, and availability by enabling denial-of-service or backdoor installation. The requirement for authenticated access limits exposure to some extent but does not eliminate risk, especially in environments with many contributors or weak access controls. E-commerce sites using WooCommerce are particularly at risk due to the plugin's integration, potentially impacting customer data and transaction integrity. The lack of known exploits in the wild suggests limited active exploitation currently, but the vulnerability's nature makes it a prime target for attackers once weaponized. Organizations worldwide with WordPress e-commerce deployments should consider this a high-priority risk.
Mitigation Recommendations
To mitigate CVE-2026-1988, organizations should immediately audit their WordPress installations for the presence of the Flexi Product Slider and Grid for WooCommerce plugin and verify the version in use. Since no official patch links are provided, administrators should consider the following steps: 1) Temporarily disable or remove the vulnerable plugin until a vendor patch is released. 2) Restrict Contributor-level and higher permissions to trusted users only, minimizing the risk of malicious shortcode insertion. 3) Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit the 'theme' parameter in the flexipsg_carousel shortcode, focusing on directory traversal patterns. 4) Monitor logs for unusual shortcode usage or file inclusion attempts. 5) Harden PHP configurations to disable dangerous functions and restrict file inclusion paths where possible. 6) Educate content creators on secure shortcode usage and the risks of including untrusted code. 7) Once a vendor patch is available, apply it promptly and verify the fix. These targeted actions go beyond generic advice by focusing on access control, monitoring, and temporary plugin management to reduce attack surface.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Netherlands, Japan, Italy, Spain
CVE-2026-1988: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wpdecent Flexi Product Slider and Grid for WooCommerce
Description
The Flexi Product Slider and Grid for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.0.5 via the `flexipsg_carousel` shortcode. This is due to the `theme` parameter being directly concatenated into a file path without proper sanitization or validation, allowing directory traversal. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server via the `theme` parameter granted they can create posts with shortcodes.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1988 identifies a Local File Inclusion vulnerability in the wpdecent Flexi Product Slider and Grid for WooCommerce plugin for WordPress, present in all versions up to 1.0.5. The vulnerability stems from the 'theme' parameter in the flexipsg_carousel shortcode being directly concatenated into a file path without proper input validation or sanitization, enabling directory traversal attacks. Authenticated users with Contributor-level permissions or higher can exploit this by creating posts containing malicious shortcodes that manipulate the 'theme' parameter to include arbitrary PHP files from the server. This can lead to remote code execution, allowing attackers to execute arbitrary code with the web server's privileges. The vulnerability does not require user interaction beyond the attacker's own actions and has a CVSS 3.1 base score of 7.5, indicating high severity. The attack vector is network-based, but the complexity is high due to the need for authenticated access and crafting of malicious shortcodes. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is categorized under CWE-98, which covers improper control of filename for include/require statements in PHP programs, a common cause of remote file inclusion and code execution vulnerabilities in PHP-based applications.
Potential Impact
The impact of CVE-2026-1988 is significant for organizations running WordPress sites with the vulnerable Flexi Product Slider and Grid for WooCommerce plugin. Successful exploitation allows attackers with low-level authenticated access (Contributor or higher) to execute arbitrary PHP code on the server, potentially leading to full site compromise, data theft, defacement, or pivoting to internal networks. This threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized code execution and content modification, and availability by enabling denial-of-service or backdoor installation. The requirement for authenticated access limits exposure to some extent but does not eliminate risk, especially in environments with many contributors or weak access controls. E-commerce sites using WooCommerce are particularly at risk due to the plugin's integration, potentially impacting customer data and transaction integrity. The lack of known exploits in the wild suggests limited active exploitation currently, but the vulnerability's nature makes it a prime target for attackers once weaponized. Organizations worldwide with WordPress e-commerce deployments should consider this a high-priority risk.
Mitigation Recommendations
To mitigate CVE-2026-1988, organizations should immediately audit their WordPress installations for the presence of the Flexi Product Slider and Grid for WooCommerce plugin and verify the version in use. Since no official patch links are provided, administrators should consider the following steps: 1) Temporarily disable or remove the vulnerable plugin until a vendor patch is released. 2) Restrict Contributor-level and higher permissions to trusted users only, minimizing the risk of malicious shortcode insertion. 3) Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit the 'theme' parameter in the flexipsg_carousel shortcode, focusing on directory traversal patterns. 4) Monitor logs for unusual shortcode usage or file inclusion attempts. 5) Harden PHP configurations to disable dangerous functions and restrict file inclusion paths where possible. 6) Educate content creators on secure shortcode usage and the risks of including untrusted code. 7) Once a vendor patch is available, apply it promptly and verify the fix. These targeted actions go beyond generic advice by focusing on access control, monitoring, and temporary plugin management to reduce attack surface.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-05T15:16:04.703Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69901aeec9e1ff5ad868940c
Added to database: 2/14/2026, 6:49:18 AM
Last enriched: 2/21/2026, 10:21:36 PM
Last updated: 3/31/2026, 1:51:35 PM
Views: 149
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.