Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13514: CWE-284 Improper Access Control in bplugins B Slider- Gutenberg Slider Block for WP

0
Medium
VulnerabilityCVE-2024-13514cvecve-2024-13514cwe-284
Published: Tue Feb 04 2025 (02/04/2025, 07:21:00 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: B Slider- Gutenberg Slider Block for WP

Description

CVE-2024-13514 is a medium severity vulnerability in the B Slider- Gutenberg Slider Block for WordPress plugin that allows authenticated users with Contributor-level access or higher to expose private post data via the 'bsb-slider' shortcode. The flaw arises from improper access control, permitting unauthorized data extraction from private posts. Exploitation requires no user interaction but does require authentication at a contributor level or above. The vulnerability affects all versions up to and including 1. 9. 5 of the plugin. Although no known exploits are currently in the wild, the risk lies in unauthorized information disclosure within WordPress sites using this plugin. Organizations using this plugin should prioritize patching or mitigating this issue to prevent data leakage. The CVSS score is 4. 3, reflecting limited impact on confidentiality and no impact on integrity or availability.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:28:33 UTC

Technical Analysis

CVE-2024-13514 identifies an improper access control vulnerability (CWE-284) in the B Slider- Gutenberg Slider Block for WordPress plugin, specifically affecting all versions up to 1.9.5. The vulnerability is triggered via the 'bsb-slider' shortcode, which lacks sufficient restrictions on which posts can be included. This flaw enables authenticated users with Contributor-level permissions or higher to access private post data that should normally be restricted. The issue stems from the plugin's failure to enforce proper authorization checks when rendering content through the shortcode, thereby exposing sensitive information. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score of 4.3 reflects a low complexity attack vector (network), low attack complexity, and privileges required at the contributor level, with no user interaction needed. The impact is limited to confidentiality, with no effect on integrity or availability. No patches or official fixes have been linked yet, and no known exploits are reported in the wild. This vulnerability is particularly relevant for WordPress sites that use the B Slider plugin to manage private content, as it could lead to unauthorized data disclosure within an organization or to external attackers who have obtained contributor-level credentials.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of private post content within WordPress sites using the affected B Slider plugin. Organizations relying on this plugin for content management risk leakage of sensitive or confidential information to users who should not have access, potentially violating privacy policies and regulatory requirements. While the vulnerability does not affect data integrity or availability, the exposure of private data can lead to reputational damage, loss of trust, and potential compliance violations. Attackers or malicious insiders with contributor-level access can exploit this flaw to gather intelligence or sensitive business information. Given WordPress's widespread use globally, the scope of affected systems is significant, especially for organizations that use this plugin to manage private or restricted content. Although exploitation requires authentication, contributor-level access is relatively low privilege, making this vulnerability more accessible than those requiring administrator rights. The absence of known exploits in the wild reduces immediate risk, but the vulnerability remains a concern until patched or mitigated.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if they are using the B Slider- Gutenberg Slider Block for WP plugin and identify the version in use. Immediate mitigation steps include restricting contributor-level access to trusted users only and auditing user roles to minimize unnecessary privileges. Administrators should monitor shortcode usage and private post access logs for suspicious activity. Since no official patch is currently linked, organizations can implement temporary workarounds such as disabling the 'bsb-slider' shortcode or removing the plugin until a fix is released. Custom code can be added to enforce stricter access controls on shortcode rendering, ensuring private posts are not exposed to unauthorized users. Regularly updating WordPress core and plugins, subscribing to vendor security advisories, and applying patches promptly once available are critical. Additionally, implementing multi-factor authentication (MFA) for all authenticated users can reduce the risk of compromised contributor accounts being used to exploit this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-17T16:38:39.888Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5cb7ef31ef0b59ef1a

Added to database: 2/25/2026, 9:49:16 PM

Last enriched: 2/26/2026, 12:28:33 AM

Last updated: 2/26/2026, 9:53:02 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats