Prodigy Commerce Vulnerability (Critical) – CVE-2026-0926

Prodigy Commerce Vulnerability (Critical) – CVE-2026-0926

by | Feb 25, 2026 | Plugins

Attack Vectors

Prodigy Commerce (WordPress plugin slug: prodigy-commerce) is affected by CVE-2026-0926, rated Critical with a CVSS 9.8 score (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue can be triggered without authentication, meaning an external attacker may be able to target your site directly over the internet.

The vulnerable entry point is the parameters[template_name] request parameter. In practical terms, this can allow an attacker to manipulate what the server tries to load, potentially leading to reading sensitive files and, in some cases, running attacker-controlled code.

This is a high-risk scenario for any site running Prodigy Commerce versions 3.3.0 and below, especially if the site is publicly accessible (typical for ecommerce and marketing sites) and if any functionality allows files to be uploaded or stored on the server.

Security Weakness

The vulnerability is a Local File Inclusion (LFI) flaw in Prodigy Commerce affecting all versions up to and including 3.3.0. LFI occurs when a website allows user-controlled input to determine which file is loaded, without sufficiently restricting it to approved, safe templates.

According to the published advisory, the parameters[template_name] parameter can be abused to include and read arbitrary files on the server, or execute arbitrary files in situations where “safe” file types can be uploaded and then included. This weakness can be used to bypass access controls, extract sensitive information, or potentially achieve code execution.

For reference, see the official CVE record: https://www.cve.org/CVERecord?id=CVE-2026-0926 and the source advisory: Wordfence vulnerability intelligence entry.

Remediation: Update Prodigy Commerce to version 3.3.1 or newer (patched version). If you have compliance requirements, document the upgrade and verify the plugin version across production, staging, and any marketing microsites.

Technical or Business Impacts

Because this is unauthenticated and Critical, it should be treated as an urgent business risk—not a routine IT ticket. Potential outcomes include:

Data exposure: Attackers may be able to read sensitive files (configuration data, environment details, logs, or other stored information). This can lead to credential theft, third-party API key exposure, and broader compromise.

Website takeover and malware risk: If the attacker can get executable code included, this can escalate to running malicious code on the server. That can enable defacement, spam/SEO poisoning, redirects, payment skimmers, or persistent backdoors—each of which can harm revenue, brand trust, and customer experience.

Operational disruption: A successful compromise often results in emergency response work, downtime, blocked campaigns, degraded site performance, and delays to ecommerce or lead-generation activity.

Regulatory and contractual impact: Unauthorized access to sensitive data may trigger incident response obligations, customer notifications, and compliance scrutiny (including security due diligence from partners, processors, or auditors). The direct cost (response, legal, forensics) and the indirect cost (lost pipeline/revenue, brand damage) can be significant.

Similar Attacks

Local file access and inclusion-style weaknesses have repeatedly led to major incidents because they can expose secrets or enable remote code execution under the right conditions. A few well-known examples include:

CVE-2021-41773 (Apache HTTP Server path traversal and file disclosure)
CVE-2021-42013 (Apache HTTP Server path traversal with potential RCE)

The common takeaway for leadership teams: issues that allow attackers to control what the server reads or loads can quickly shift from “information leak” to “full compromise,” especially on public-facing sites supporting marketing and ecommerce operations. Updating Prodigy Commerce to 3.3.1+ is the fastest risk-reduction step.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers