{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T05:02:16.602","vulnerabilities":[{"cve":{"id":"CVE-2026-1988","sourceIdentifier":"security@wordfence.com","published":"2026-02-14T07:16:12.670","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Flexi Product Slider and Grid for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.0.5 via the `flexipsg_carousel` shortcode. This is due to the `theme` parameter being directly concatenated into a file path without proper sanitization or validation, allowing directory traversal. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server via the `theme` parameter granted they can create posts with shortcodes."},{"lang":"es","value":"El plugin Flexi Product Slider y Grid para WooCommerce para WordPress es vulnerable a la inclusión local de ficheros en todas las versiones hasta la 1.0.5, inclusive, a través del shortcode 'flexipsg_carousel'. Esto se debe a que el parámetro 'theme' se concatena directamente en una ruta de fichero sin una sanitización o validación adecuadas, lo que permite el salto de directorio. Esto hace posible que atacantes autenticados, con acceso de nivel Colaborador y superior, incluyan y ejecuten ficheros PHP arbitrarios en el servidor a través del parámetro 'theme' siempre que puedan crear publicaciones con shortcodes."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-98"}]}],"references":[{"url":"https://cwe.mitre.org/data/definitions/22.html","source":"security@wordfence.com"},{"url":"https://cwe.mitre.org/data/definitions/98.html","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/flexi-product-slider-grid/tags/1.0.5/includes/class-flexipsg-shortcode.php#L82","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/flexi-product-slider-grid/trunk/includes/class-flexipsg-shortcode.php#L82","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/ffdd5446-5835-4976-b764-9b5c75251438?source=cve","source":"security@wordfence.com"}]}}]}