CVE-2026-22356: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Automattic Jetpack CRM
CVE-2026-22356 is a vulnerability in Automattic's Jetpack CRM (zero-bs-crm) up to version 6. 7. 0 that allows improper control of filenames in PHP include/require statements, leading to a Local File Inclusion (LFI) issue. This flaw enables attackers to include and execute arbitrary local files on the server, potentially exposing sensitive data or enabling further code execution. No public exploits are currently known, and no CVSS score has been assigned. The vulnerability affects PHP-based web applications using Jetpack CRM, which is popular among small to medium businesses for customer relationship management. Exploitation requires the attacker to manipulate input parameters controlling file inclusion without authentication or user interaction. Organizations running vulnerable versions of Jetpack CRM should prioritize patching or applying mitigations to prevent unauthorized file access and possible server compromise. Countries with significant usage of WordPress and PHP-based CRMs, especially in North America, Europe, and parts of Asia, are at higher risk. The severity is assessed as high due to the potential impact on confidentiality and integrity, ease of exploitation, and broad scope of affected systems.
AI Analysis
Technical Summary
CVE-2026-22356 identifies a Local File Inclusion (LFI) vulnerability in Automattic's Jetpack CRM plugin for WordPress, specifically in versions up to 6.7.0. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements. This flaw allows an attacker to manipulate the input that determines which file is included by the PHP script, enabling the inclusion of arbitrary local files from the server. Such an attack can lead to disclosure of sensitive files (e.g., configuration files, password stores), execution of malicious code if the included files contain executable PHP code, or even full system compromise if combined with other vulnerabilities. The vulnerability is classified as a Local File Inclusion rather than Remote File Inclusion, indicating that the attacker can only include files present on the local filesystem, not remote URLs. No public exploits have been reported yet, and no official patch links are provided in the data, suggesting that remediation may still be pending or in progress. The vulnerability was reserved in early January 2026 and published in February 2026. The absence of a CVSS score requires a severity assessment based on the potential impact and exploitability. Given the widespread use of Jetpack CRM in WordPress environments, this vulnerability poses a significant risk to organizations relying on this CRM plugin for customer relationship management. Attackers exploiting this flaw could gain unauthorized access to sensitive data or execute arbitrary code, undermining system integrity and availability.
Potential Impact
The impact of CVE-2026-22356 is substantial for organizations using Jetpack CRM, as successful exploitation can lead to unauthorized disclosure of sensitive information stored on the server, including configuration files, credentials, and customer data. Additionally, attackers may execute arbitrary PHP code by including crafted files, potentially leading to full system compromise, data manipulation, or service disruption. This can result in loss of confidentiality, integrity, and availability of critical business data and services. For organizations handling sensitive customer information or operating in regulated industries, the breach could lead to compliance violations, reputational damage, and financial losses. The vulnerability's exploitation does not currently require known public exploits, but the ease of triggering the LFI through manipulated input increases the risk. The scope includes all installations of Jetpack CRM up to version 6.7.0, which may be widespread given the popularity of WordPress and its plugins. The absence of authentication requirements is unclear, but if exploitation is possible without authentication, the risk is further elevated. Overall, the threat could enable attackers to pivot within the network, escalate privileges, or establish persistent access.
Mitigation Recommendations
To mitigate CVE-2026-22356, organizations should immediately verify if they are running Jetpack CRM versions up to and including 6.7.0 and plan to upgrade to a patched version once available. In the absence of an official patch, administrators should implement strict input validation and sanitization on all parameters controlling file inclusion paths to prevent manipulation. Employing web application firewalls (WAFs) with rules targeting LFI attack patterns can help detect and block exploitation attempts. Restricting file system permissions to limit the PHP process's access to sensitive files reduces potential damage. Disabling unnecessary PHP functions such as include, require, or allow_url_include where feasible can also reduce risk. Monitoring logs for suspicious requests involving file inclusion parameters is critical for early detection. Additionally, isolating the CRM environment and enforcing network segmentation can limit lateral movement if exploitation occurs. Organizations should also review and harden their WordPress and plugin configurations, removing unused plugins and themes to reduce attack surface. Finally, maintain regular backups and incident response plans to recover quickly if compromise occurs.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2026-22356: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Automattic Jetpack CRM
Description
CVE-2026-22356 is a vulnerability in Automattic's Jetpack CRM (zero-bs-crm) up to version 6. 7. 0 that allows improper control of filenames in PHP include/require statements, leading to a Local File Inclusion (LFI) issue. This flaw enables attackers to include and execute arbitrary local files on the server, potentially exposing sensitive data or enabling further code execution. No public exploits are currently known, and no CVSS score has been assigned. The vulnerability affects PHP-based web applications using Jetpack CRM, which is popular among small to medium businesses for customer relationship management. Exploitation requires the attacker to manipulate input parameters controlling file inclusion without authentication or user interaction. Organizations running vulnerable versions of Jetpack CRM should prioritize patching or applying mitigations to prevent unauthorized file access and possible server compromise. Countries with significant usage of WordPress and PHP-based CRMs, especially in North America, Europe, and parts of Asia, are at higher risk. The severity is assessed as high due to the potential impact on confidentiality and integrity, ease of exploitation, and broad scope of affected systems.
AI-Powered Analysis
Technical Analysis
CVE-2026-22356 identifies a Local File Inclusion (LFI) vulnerability in Automattic's Jetpack CRM plugin for WordPress, specifically in versions up to 6.7.0. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements. This flaw allows an attacker to manipulate the input that determines which file is included by the PHP script, enabling the inclusion of arbitrary local files from the server. Such an attack can lead to disclosure of sensitive files (e.g., configuration files, password stores), execution of malicious code if the included files contain executable PHP code, or even full system compromise if combined with other vulnerabilities. The vulnerability is classified as a Local File Inclusion rather than Remote File Inclusion, indicating that the attacker can only include files present on the local filesystem, not remote URLs. No public exploits have been reported yet, and no official patch links are provided in the data, suggesting that remediation may still be pending or in progress. The vulnerability was reserved in early January 2026 and published in February 2026. The absence of a CVSS score requires a severity assessment based on the potential impact and exploitability. Given the widespread use of Jetpack CRM in WordPress environments, this vulnerability poses a significant risk to organizations relying on this CRM plugin for customer relationship management. Attackers exploiting this flaw could gain unauthorized access to sensitive data or execute arbitrary code, undermining system integrity and availability.
Potential Impact
The impact of CVE-2026-22356 is substantial for organizations using Jetpack CRM, as successful exploitation can lead to unauthorized disclosure of sensitive information stored on the server, including configuration files, credentials, and customer data. Additionally, attackers may execute arbitrary PHP code by including crafted files, potentially leading to full system compromise, data manipulation, or service disruption. This can result in loss of confidentiality, integrity, and availability of critical business data and services. For organizations handling sensitive customer information or operating in regulated industries, the breach could lead to compliance violations, reputational damage, and financial losses. The vulnerability's exploitation does not currently require known public exploits, but the ease of triggering the LFI through manipulated input increases the risk. The scope includes all installations of Jetpack CRM up to version 6.7.0, which may be widespread given the popularity of WordPress and its plugins. The absence of authentication requirements is unclear, but if exploitation is possible without authentication, the risk is further elevated. Overall, the threat could enable attackers to pivot within the network, escalate privileges, or establish persistent access.
Mitigation Recommendations
To mitigate CVE-2026-22356, organizations should immediately verify if they are running Jetpack CRM versions up to and including 6.7.0 and plan to upgrade to a patched version once available. In the absence of an official patch, administrators should implement strict input validation and sanitization on all parameters controlling file inclusion paths to prevent manipulation. Employing web application firewalls (WAFs) with rules targeting LFI attack patterns can help detect and block exploitation attempts. Restricting file system permissions to limit the PHP process's access to sensitive files reduces potential damage. Disabling unnecessary PHP functions such as include, require, or allow_url_include where feasible can also reduce risk. Monitoring logs for suspicious requests involving file inclusion parameters is critical for early detection. Additionally, isolating the CRM environment and enforcing network segmentation can limit lateral movement if exploitation occurs. Organizations should also review and harden their WordPress and plugin configurations, removing unused plugins and themes to reduce attack surface. Finally, maintain regular backups and incident response plans to recover quickly if compromise occurs.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2026-01-07T12:21:24.564Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6998ca00be58cf853bab9212
Added to database: 2/20/2026, 8:54:24 PM
Last enriched: 2/20/2026, 9:52:50 PM
Last updated: 2/21/2026, 4:08:59 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27192: CWE-346: Origin Validation Error in feathersjs feathers
HighCVE-2026-27191: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in feathersjs feathers
HighCVE-2025-65995: CWE-209 Generation of Error Message Containing Sensitive Information in Apache Software Foundation Apache Airflow
HighCVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.