Flexi Product Slider and Grid for WooCommerce Vulnerability (High) …

Flexi Product Slider and Grid for WooCommerce Vulnerability (High) …

by | Feb 13, 2026 | Plugins

Attack Vectors

Flexi Product Slider and Grid for WooCommerce (slug: flexi-product-slider-grid) has a High-severity vulnerability (CVSS 7.5, CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) affecting versions up to and including 1.0.5. It is tracked as CVE-2026-1988.

The risk is primarily from authenticated attackers with Contributor-level access (or higher) who can create posts containing shortcodes. By placing the flexipsg_carousel shortcode in content and manipulating its theme attribute, an attacker may be able to trigger local file inclusion on the server.

From a business standpoint, this is most relevant for organizations that allow multiple internal users, agencies, freelancers, or partners to publish or draft content in WordPress. Any compromised Contributor account can become a pathway to broader site compromise.

Security Weakness

The vulnerability is a Local File Inclusion (LFI) issue in the flexipsg_carousel shortcode. The plugin’s theme parameter is described as being directly concatenated into a file path without proper sanitization or validation, enabling directory traversal.

According to the published advisory, this can allow attackers to include and execute arbitrary PHP files on the server via the theme parameter, provided they can create posts with shortcodes.

No known patch is available at the time of the referenced disclosure. Risk decisions should be made according to your organization’s tolerance; many teams will consider uninstalling the affected plugin and replacing it as the safest course.

Technical or Business Impacts

Because the issue can enable inclusion and execution of server-side PHP files, the potential outcome is not limited to a single page or a cosmetic defect. In practical terms, this type of weakness can lead to full site compromise, including unauthorized access to sensitive data and the ability to alter site behavior.

Confidentiality impact: exposure of business data stored on or accessible through the WordPress environment (for example, configuration details, operational files, and potentially data tied to WooCommerce operations depending on what the attacker can access). This can create reporting obligations and reputational risk for leadership and Compliance.

Integrity impact: attackers may be able to modify site content, inject unauthorized scripts, or change commerce-related workflows (such as checkout experiences or promotional landing pages), directly affecting revenue, brand trust, and marketing performance.

Availability impact: a compromised site may be defaced, disrupted, or taken offline, leading to campaign interruption, lost sales, and emergency response costs. For regulated organizations, downtime and potential data exposure can also increase audit and compliance pressure.

Recommended mitigations (given no known patch): consider uninstalling Flexi Product Slider and Grid for WooCommerce (versions ≤ 1.0.5) and replacing it with an alternative; reduce Contributor permissions and limit who can publish or insert shortcodes; review user accounts for least privilege; monitor for unusual post edits or shortcode usage involving flexipsg_carousel; and evaluate protective controls (such as security plugins or web application firewall rules) that can help detect or block malicious traversal patterns.

Similar Attacks

Local File Inclusion and directory traversal issues have been used in real-world attacks to gain deeper access, execute server-side code, and compromise sites. Examples include:

Drupal “Drupalgeddon 2” (CVE-2018-7600) — a widely exploited Drupal flaw that led to large-scale site compromises.

PHP-FPM remote code execution via Nginx configuration (CVE-2019-11043) — leveraged in real attacks to execute code on servers under certain configurations.

Apache HTTP Server path traversal (CVE-2021-41773) — used to read sensitive files and, in some setups, enable broader compromise.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers