Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27052: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in villatheme Sales Countdown Timer for WooCommerce and WordPress

0
High
VulnerabilityCVE-2026-27052cvecve-2026-27052
Published: Thu Feb 19 2026 (02/19/2026, 08:27:09 UTC)
Source: CVE Database V5
Vendor/Project: villatheme
Product: Sales Countdown Timer for WooCommerce and WordPress

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in villatheme Sales Countdown Timer for WooCommerce and WordPress sctv-sales-countdown-timer allows PHP Local File Inclusion.This issue affects Sales Countdown Timer for WooCommerce and WordPress: from n/a through < 1.1.9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 01:18:38 UTC

Technical Analysis

CVE-2026-27052 is a Remote File Inclusion (RFI) vulnerability found in the villatheme Sales Countdown Timer plugin for WooCommerce and WordPress, affecting all versions prior to 1.1.9. The vulnerability arises from improper validation and control of filenames used in PHP include or require statements within the plugin's code. This flaw allows an attacker to supply a crafted filename parameter that can cause the application to include and execute remote malicious PHP files. As a result, an attacker can achieve remote code execution (RCE) on the affected server. The vulnerability requires network access but only low privileges, and no user interaction is needed to exploit it. The CVSS v3.1 base score of 7.5 indicates high severity, with a vector string AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack is network-based, requires high attack complexity, low privileges, no user interaction, unchanged scope, and results in high confidentiality, integrity, and availability impacts. The plugin is commonly used in WordPress e-commerce sites running WooCommerce, making it a critical component in online retail environments. Although no public exploits are currently known, the vulnerability poses a significant risk if weaponized. The lack of an official patch link suggests that users should monitor vendor advisories closely and consider temporary mitigations.

Potential Impact

The impact of CVE-2026-27052 is substantial for organizations using the vulnerable Sales Countdown Timer plugin. Successful exploitation leads to remote code execution, allowing attackers to fully compromise the affected web server. This can result in data theft, website defacement, insertion of backdoors, pivoting to internal networks, and disruption of e-commerce operations. Confidential customer data, including payment information and personal details, may be exposed or manipulated, leading to financial losses and reputational damage. The availability of the e-commerce platform can be disrupted, causing business interruptions and loss of revenue. Given the plugin's integration with WooCommerce, a widely used e-commerce platform, the scope of affected systems is broad. Organizations without timely patching or mitigations are at risk of targeted attacks, especially from threat actors focusing on online retail and financial gain. The requirement for low privileges and no user interaction lowers the barrier for exploitation, increasing the threat level.

Mitigation Recommendations

1. Immediate upgrade: Organizations should update the Sales Countdown Timer plugin to version 1.1.9 or later once available, as this will contain the official patch for the vulnerability. 2. Input validation: Until a patch is applied, implement web application firewall (WAF) rules to detect and block suspicious requests attempting to exploit file inclusion, especially those containing remote URLs or unusual filename parameters. 3. Disable remote file inclusion: Configure PHP settings to disable allow_url_include and allow_url_fopen directives, preventing inclusion of remote files. 4. Principle of least privilege: Run the web server and PHP processes with minimal privileges to limit the impact of potential exploitation. 5. Monitor logs: Continuously monitor web server and application logs for unusual include/require requests or errors indicating attempted exploitation. 6. Isolate critical systems: Segment e-commerce servers from other internal networks to reduce lateral movement if compromise occurs. 7. Backup and recovery: Maintain regular backups of website and database content to enable rapid recovery in case of compromise. 8. Vendor communication: Stay in contact with villatheme for official patches and advisories, and subscribe to security mailing lists for timely updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-02-17T13:23:30.505Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6996d0406aea4a407a4bdc00

Added to database: 2/19/2026, 8:56:32 AM

Last enriched: 4/3/2026, 1:18:38 AM

Last updated: 4/3/2026, 1:57:35 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses