CVE-2026-1257

WordPress · WordPress Administrative Shortcodes plugin

A high-severity vulnerability has been identified in the Administrative Shortcodes plugin for WordPress.

Executive summary

A high-severity vulnerability has been identified in the Administrative Shortcodes plugin for WordPress. This flaw, known as Local File Inclusion, could allow an unauthenticated attacker to trick the website into displaying the contents of sensitive files from the server. Successful exploitation could lead to the exposure of confidential information, such as database credentials and system configuration files, potentially enabling further attacks against the organization.

Vulnerability

The vulnerability is a Local File Inclusion (LFI) flaw within the Administrative Shortcodes plugin. Due to insufficient input validation, an attacker can manipulate a parameter used by a shortcode to specify a file path on the server. This allows the attacker to include and execute or display the contents of arbitrary files from the server's local filesystem, such as wp-config.php (containing database credentials), /etc/passwd, or other sensitive configuration files accessible by the web server's user account.

Business impact

This is a High severity vulnerability with a CVSS score of 7.5. Successful exploitation could lead to a significant data breach through the exfiltration of sensitive information. Consequences include the exposure of database credentials, API keys, internal server paths, and other configuration details. This information can be leveraged by attackers to escalate privileges, gain unauthorized access to the database, or pivot to other systems within the network, ultimately leading to reputational damage, financial loss, and potential regulatory fines.

Remediation

Immediate Action:

  • Immediately update the Administrative Shortcodes WordPress plugin to the latest patched version provided by the vendor.
  • If the plugin is not critical to business operations, the recommended course of action is to deactivate and completely remove it to eliminate this attack vector.
  • Review WordPress security settings and file permissions to ensure they adhere to the principle of least privilege.

Proactive Monitoring:

  • Monitor web server access logs for requests containing directory traversal patterns (e.g., ../, ..\/, %2e%2e%2f) in URL parameters, particularly those associated with the vulnerable plugin's functionality.
  • Implement file integrity monitoring on critical system files (e.g., wp-config.php) to detect unauthorized access or read attempts.
  • Analyze network traffic for unusual outbound data flows that could indicate data exfiltration.

Compensating Controls:

  • If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules specifically configured to detect and block LFI and directory traversal attack patterns.
  • Harden the web server's file system permissions to restrict the web server process from accessing sensitive files and directories outside of the web root.
  • Disable PHP functions that are commonly abused in LFI attacks, such as file_get_contents, include, and require, if they are not essential for the application's functionality.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the High severity (CVSS 7.5) of this vulnerability and the direct risk of sensitive data exposure, we recommend immediate and decisive action. Organizations utilizing the Administrative Shortcodes plugin for WordPress must prioritize applying the vendor-supplied patch without delay. While this CVE is not currently listed on the CISA KEV catalog, its high impact and the ubiquitous nature of the WordPress platform make it a highly attractive target for opportunistic attackers. All remediation and mitigation steps should be implemented urgently to prevent a potential data breach.