Wordpress RCE (CVE-2026-1988)
CVE-2026-1988
The Flexi Product Slider and Grid for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.0.5 via the `flexipsg_carousel` shortcode. This is ...
Overview
A significant security vulnerability has been identified in the Flexi Product Slider and Grid for WooCommerce plugin for WordPress. This flaw allows an attacker with basic access to a WordPress site to read and potentially execute sensitive files on the underlying web server.
Vulnerability Explained
In simple terms, the plugin contains a feature (a shortcode) that users can add to posts or pages to display product sliders. This feature uses a theme parameter to decide which design template to load. The vulnerability exists because the plugin does not properly check or restrict the value provided to this parameter.
An attacker can manipulate this parameter to use directory traversal sequences (like ../../../) to break out of the plugin’s intended directory and force the website to include files from anywhere else on the server. This could include critical system files, configuration files containing passwords, or other PHP files that the attacker may have uploaded.
Potential Impact
The impact of this vulnerability is severe. An attacker with a low-privilege user account (Contributor or higher) can:
- Read Sensitive Information: Access the WordPress configuration file (
wp-config.php), which contains database credentials and secret keys, leading to a complete site takeover. - Execute Code: Include and execute existing PHP files on the server, potentially leading to remote code execution (RCE). This grants the attacker full control of the affected web server.
- Disclose Server Data: Read other sensitive files on the host, potentially exposing data from other applications or user information.
This vulnerability received a CVSS score of 7.5 (High), reflecting the high confidentiality and integrity impact on the affected system.
Remediation and Mitigation
Immediate action is required to secure affected websites.
Primary Action: Update the Plugin
The most critical step is to update the Flexi Product Slider and Grid for WooCommerce plugin to version 1.0.6 or higher. The plugin developer has released a patch that properly validates and sanitizes the theme parameter to prevent path traversal.
Immediate Mitigation (If Update is Not Possible):
- Temporarily Deactivate and Delete the plugin if it is not absolutely essential for site functionality.
- Review User Accounts: Audit and minimize the number of users with Contributor, Author, Editor, or Administrator roles. Ensure all user passwords are strong.
- Monitor for Suspicious Activity: Check server logs for unusual file access attempts and review recently created or modified posts/pages for suspicious shortcode usage.
Website administrators should apply the update as soon as possible to eliminate this attack vector and protect their server infrastructure.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.9 via the 'parameters[template_name]' parameter. This makes it possible for un...
The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callb...
The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the...
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' ...
Other WordPress Vulnerabilities
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' ...
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input ...
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient...
The WP Mail Logging plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.15.0 via deserialization of untrusted input from the email log message field. Thi...