Prodigy Commerce Vulnerability (Critical) – CVE-2026-0926

Prodigy Commerce Vulnerability (Critical) – CVE-2026-0926

by | Feb 18, 2026 | Plugins

Attack Vectors

Prodigy Commerce (WordPress plugin slug: prodigy-commerce) has a Critical vulnerability (CVE-2026-0926, CVSS 9.8) affecting all versions up to and including 3.2.9. The issue is an unauthenticated Local File Inclusion (LFI) vulnerability triggered through the parameters[template_name] parameter.

Because this attack is network-reachable and requires no login, attackers can probe public-facing sites and attempt to include server files remotely. In practical terms, this can enable reading sensitive files and, in some cases, executing PHP code from files that exist on the server.

Security Weakness

The core weakness is a path/templating control flaw where user-supplied input (the parameters[template_name] parameter) can influence what file the server includes. When a plugin allows a file include operation to be driven by untrusted input, attackers may be able to load arbitrary local files.

According to the published advisory, this can lead to arbitrary file reads or execution of arbitrary files on the server, including execution of PHP code contained in those files. This may also be chained with common business workflows (such as uploading assets) in environments where “safe” file types can be uploaded and then included.

Technical or Business Impacts

Data exposure and compliance risk: Arbitrary file inclusion can enable attackers to access sensitive information stored on the server, which may include credentials, configuration details, or other confidential data. For regulated organizations, this can trigger incident response obligations, customer notifications, and audit scrutiny.

Website takeover and brand damage: If attackers achieve code execution, they can potentially alter site content, inject malicious code, create backdoors, or redirect traffic. This can harm brand trust, disrupt campaigns, and compromise analytics and lead-capture forms.

Operational disruption: With the highest availability impact (per CVSS), attackers may be able to disrupt website operations, impacting revenue, customer service, and partner programs that depend on the site being online.

Financial impact: Incident response, forensics, legal review, and recovery efforts can quickly exceed the cost of replacing an affected plugin—especially for high-traffic sites or organizations with strict compliance requirements.

Remediation

No known patch is available for Prodigy Commerce at the time of the referenced disclosure. For most organizations, the safest path is to uninstall the affected plugin and replace it with an alternative that meets business and security requirements.

If immediate removal is not feasible due to operational dependency, consider risk-based mitigations while you plan replacement—such as reducing exposure of the vulnerable functionality where possible and increasing monitoring for suspicious requests. Evaluate these steps in line with your organization’s risk tolerance and compliance obligations. Reference details: Wordfence vulnerability record and CVE-2026-0926.

Similar Attacks

Local File Inclusion and related file-include flaws have been repeatedly abused to read sensitive files and, in some cases, escalate to code execution. Real-world examples include:

CVE-2023-46604 (Apache ActiveMQ) — widely exploited vulnerability enabling serious compromise scenarios

CVE-2021-41773 (Apache HTTP Server) — path traversal that enabled reading arbitrary files and, under specific configurations, code execution

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers