Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1988: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wpdecent Flexi Product Slider and Grid for WooCommerce

0
High
VulnerabilityCVE-2026-1988cvecve-2026-1988cwe-98
Published: Sat Feb 14 2026 (02/14/2026, 06:42:37 UTC)
Source: CVE Database V5
Vendor/Project: wpdecent
Product: Flexi Product Slider and Grid for WooCommerce

Description

The Flexi Product Slider and Grid for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.0.5 via the `flexipsg_carousel` shortcode. This is due to the `theme` parameter being directly concatenated into a file path without proper sanitization or validation, allowing directory traversal. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server via the `theme` parameter granted they can create posts with shortcodes.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 22:21:36 UTC

Technical Analysis

CVE-2026-1988 identifies a Local File Inclusion vulnerability in the wpdecent Flexi Product Slider and Grid for WooCommerce plugin for WordPress, present in all versions up to 1.0.5. The vulnerability stems from the 'theme' parameter in the flexipsg_carousel shortcode being directly concatenated into a file path without proper input validation or sanitization, enabling directory traversal attacks. Authenticated users with Contributor-level permissions or higher can exploit this by creating posts containing malicious shortcodes that manipulate the 'theme' parameter to include arbitrary PHP files from the server. This can lead to remote code execution, allowing attackers to execute arbitrary code with the web server's privileges. The vulnerability does not require user interaction beyond the attacker's own actions and has a CVSS 3.1 base score of 7.5, indicating high severity. The attack vector is network-based, but the complexity is high due to the need for authenticated access and crafting of malicious shortcodes. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is categorized under CWE-98, which covers improper control of filename for include/require statements in PHP programs, a common cause of remote file inclusion and code execution vulnerabilities in PHP-based applications.

Potential Impact

The impact of CVE-2026-1988 is significant for organizations running WordPress sites with the vulnerable Flexi Product Slider and Grid for WooCommerce plugin. Successful exploitation allows attackers with low-level authenticated access (Contributor or higher) to execute arbitrary PHP code on the server, potentially leading to full site compromise, data theft, defacement, or pivoting to internal networks. This threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized code execution and content modification, and availability by enabling denial-of-service or backdoor installation. The requirement for authenticated access limits exposure to some extent but does not eliminate risk, especially in environments with many contributors or weak access controls. E-commerce sites using WooCommerce are particularly at risk due to the plugin's integration, potentially impacting customer data and transaction integrity. The lack of known exploits in the wild suggests limited active exploitation currently, but the vulnerability's nature makes it a prime target for attackers once weaponized. Organizations worldwide with WordPress e-commerce deployments should consider this a high-priority risk.

Mitigation Recommendations

To mitigate CVE-2026-1988, organizations should immediately audit their WordPress installations for the presence of the Flexi Product Slider and Grid for WooCommerce plugin and verify the version in use. Since no official patch links are provided, administrators should consider the following steps: 1) Temporarily disable or remove the vulnerable plugin until a vendor patch is released. 2) Restrict Contributor-level and higher permissions to trusted users only, minimizing the risk of malicious shortcode insertion. 3) Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit the 'theme' parameter in the flexipsg_carousel shortcode, focusing on directory traversal patterns. 4) Monitor logs for unusual shortcode usage or file inclusion attempts. 5) Harden PHP configurations to disable dangerous functions and restrict file inclusion paths where possible. 6) Educate content creators on secure shortcode usage and the risks of including untrusted code. 7) Once a vendor patch is available, apply it promptly and verify the fix. These targeted actions go beyond generic advice by focusing on access control, monitoring, and temporary plugin management to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-05T15:16:04.703Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69901aeec9e1ff5ad868940c

Added to database: 2/14/2026, 6:49:18 AM

Last enriched: 2/21/2026, 10:21:36 PM

Last updated: 3/31/2026, 1:51:35 PM

Views: 149

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses