CVE-2026-1988: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wpdecent Flexi Product Slider and Grid for WooCommerce
The Flexi Product Slider and Grid for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.0.5 via the `flexipsg_carousel` shortcode. This is due to the `theme` parameter being directly concatenated into a file path without proper sanitization or validation, allowing directory traversal. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server via the `theme` parameter granted they can create posts with shortcodes.
AI Analysis
Technical Summary
CVE-2026-1988 is a Local File Inclusion vulnerability categorized under CWE-98 affecting the Flexi Product Slider and Grid for WooCommerce plugin for WordPress. The flaw resides in the handling of the 'theme' parameter within the flexipsg_carousel shortcode, where the parameter value is concatenated directly into a file path without proper sanitization or validation. This improper control allows an authenticated attacker with Contributor-level access or higher to perform directory traversal attacks, enabling the inclusion and execution of arbitrary PHP files on the server. Since WordPress shortcodes can be embedded in posts, and Contributors can create posts, the attacker can leverage this to execute malicious code remotely. The vulnerability impacts confidentiality, integrity, and availability by potentially allowing full server compromise. The CVSS 3.1 base score is 7.5, indicating a high severity with network attack vector, high impact on confidentiality, integrity, and availability, low attack complexity, and requiring low privileges but no user interaction. No patches are currently available, and no known exploits have been observed in the wild. The vulnerability is significant for WooCommerce sites using this plugin, which is popular among e-commerce businesses. The attack surface includes any site allowing Contributor-level users to create content with shortcodes, making internal threat actors or compromised accounts a concern. The flaw underscores the importance of strict input validation and least privilege principles in WordPress plugin development.
Potential Impact
For European organizations, this vulnerability poses a serious risk to e-commerce platforms running WooCommerce with the affected plugin. Exploitation can lead to remote code execution, resulting in data breaches, defacement, malware deployment, or full server takeover. This compromises customer data confidentiality, disrupts business operations, and damages brand reputation. Given the widespread use of WordPress and WooCommerce in Europe, especially among small and medium enterprises, the attack surface is considerable. Organizations with Contributor-level users who can create posts are particularly vulnerable, increasing insider threat risks. The potential for lateral movement within networks and persistence makes this a critical concern for incident response teams. Additionally, regulatory compliance such as GDPR mandates protection of personal data, and exploitation could lead to significant legal and financial penalties. The absence of known exploits provides a window for proactive mitigation, but the high impact demands urgent attention.
Mitigation Recommendations
Immediate mitigation steps include restricting Contributor-level permissions to trusted users only and auditing existing users for unnecessary privileges. Administrators should disable or remove the Flexi Product Slider and Grid for WooCommerce plugin until a security patch is released. Implementing Web Application Firewall (WAF) rules to detect and block directory traversal patterns in shortcode parameters can provide temporary protection. Monitoring logs for unusual shortcode usage or file inclusion attempts is critical for early detection. Developers and site administrators should enforce strict input validation and sanitization on all user-supplied parameters, especially those used in file paths. Employing the principle of least privilege for file system permissions can limit the impact of successful exploitation. Once a patch is available, prompt application is essential. Additionally, organizations should educate content creators about the risks of embedding untrusted shortcodes and consider multi-factor authentication to reduce account compromise risks.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland
CVE-2026-1988: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wpdecent Flexi Product Slider and Grid for WooCommerce
Description
The Flexi Product Slider and Grid for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.0.5 via the `flexipsg_carousel` shortcode. This is due to the `theme` parameter being directly concatenated into a file path without proper sanitization or validation, allowing directory traversal. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server via the `theme` parameter granted they can create posts with shortcodes.
AI-Powered Analysis
Technical Analysis
CVE-2026-1988 is a Local File Inclusion vulnerability categorized under CWE-98 affecting the Flexi Product Slider and Grid for WooCommerce plugin for WordPress. The flaw resides in the handling of the 'theme' parameter within the flexipsg_carousel shortcode, where the parameter value is concatenated directly into a file path without proper sanitization or validation. This improper control allows an authenticated attacker with Contributor-level access or higher to perform directory traversal attacks, enabling the inclusion and execution of arbitrary PHP files on the server. Since WordPress shortcodes can be embedded in posts, and Contributors can create posts, the attacker can leverage this to execute malicious code remotely. The vulnerability impacts confidentiality, integrity, and availability by potentially allowing full server compromise. The CVSS 3.1 base score is 7.5, indicating a high severity with network attack vector, high impact on confidentiality, integrity, and availability, low attack complexity, and requiring low privileges but no user interaction. No patches are currently available, and no known exploits have been observed in the wild. The vulnerability is significant for WooCommerce sites using this plugin, which is popular among e-commerce businesses. The attack surface includes any site allowing Contributor-level users to create content with shortcodes, making internal threat actors or compromised accounts a concern. The flaw underscores the importance of strict input validation and least privilege principles in WordPress plugin development.
Potential Impact
For European organizations, this vulnerability poses a serious risk to e-commerce platforms running WooCommerce with the affected plugin. Exploitation can lead to remote code execution, resulting in data breaches, defacement, malware deployment, or full server takeover. This compromises customer data confidentiality, disrupts business operations, and damages brand reputation. Given the widespread use of WordPress and WooCommerce in Europe, especially among small and medium enterprises, the attack surface is considerable. Organizations with Contributor-level users who can create posts are particularly vulnerable, increasing insider threat risks. The potential for lateral movement within networks and persistence makes this a critical concern for incident response teams. Additionally, regulatory compliance such as GDPR mandates protection of personal data, and exploitation could lead to significant legal and financial penalties. The absence of known exploits provides a window for proactive mitigation, but the high impact demands urgent attention.
Mitigation Recommendations
Immediate mitigation steps include restricting Contributor-level permissions to trusted users only and auditing existing users for unnecessary privileges. Administrators should disable or remove the Flexi Product Slider and Grid for WooCommerce plugin until a security patch is released. Implementing Web Application Firewall (WAF) rules to detect and block directory traversal patterns in shortcode parameters can provide temporary protection. Monitoring logs for unusual shortcode usage or file inclusion attempts is critical for early detection. Developers and site administrators should enforce strict input validation and sanitization on all user-supplied parameters, especially those used in file paths. Employing the principle of least privilege for file system permissions can limit the impact of successful exploitation. Once a patch is available, prompt application is essential. Additionally, organizations should educate content creators about the risks of embedding untrusted shortcodes and consider multi-factor authentication to reduce account compromise risks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-05T15:16:04.703Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69901aeec9e1ff5ad868940c
Added to database: 2/14/2026, 6:49:18 AM
Last enriched: 2/14/2026, 7:03:41 AM
Last updated: 2/14/2026, 8:26:21 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23766
LowCVE-2026-2312: CWE-862 Missing Authorization in maxfoundry Media Library Folders
MediumCVE-2026-1512: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2026-1843: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in optimole Super Page Cache
HighCVE-2026-1258: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in getwpfunnels Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.