CVE-2024-13514: CWE-284 Improper Access Control in bplugins B Slider- Gutenberg Slider Block for WP
CVE-2024-13514 is a medium severity vulnerability in the B Slider- Gutenberg Slider Block for WordPress plugin that allows authenticated users with Contributor-level access or higher to expose private post data via the 'bsb-slider' shortcode. The flaw arises from improper access control, permitting unauthorized data extraction from private posts. Exploitation requires no user interaction but does require authentication at a contributor level or above. The vulnerability affects all versions up to and including 1. 9. 5 of the plugin. Although no known exploits are currently in the wild, the risk lies in unauthorized information disclosure within WordPress sites using this plugin. Organizations using this plugin should prioritize patching or mitigating this issue to prevent data leakage. The CVSS score is 4. 3, reflecting limited impact on confidentiality and no impact on integrity or availability.
AI Analysis
Technical Summary
CVE-2024-13514 identifies an improper access control vulnerability (CWE-284) in the B Slider- Gutenberg Slider Block for WordPress plugin, specifically affecting all versions up to 1.9.5. The vulnerability is triggered via the 'bsb-slider' shortcode, which lacks sufficient restrictions on which posts can be included. This flaw enables authenticated users with Contributor-level permissions or higher to access private post data that should normally be restricted. The issue stems from the plugin's failure to enforce proper authorization checks when rendering content through the shortcode, thereby exposing sensitive information. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score of 4.3 reflects a low complexity attack vector (network), low attack complexity, and privileges required at the contributor level, with no user interaction needed. The impact is limited to confidentiality, with no effect on integrity or availability. No patches or official fixes have been linked yet, and no known exploits are reported in the wild. This vulnerability is particularly relevant for WordPress sites that use the B Slider plugin to manage private content, as it could lead to unauthorized data disclosure within an organization or to external attackers who have obtained contributor-level credentials.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of private post content within WordPress sites using the affected B Slider plugin. Organizations relying on this plugin for content management risk leakage of sensitive or confidential information to users who should not have access, potentially violating privacy policies and regulatory requirements. While the vulnerability does not affect data integrity or availability, the exposure of private data can lead to reputational damage, loss of trust, and potential compliance violations. Attackers or malicious insiders with contributor-level access can exploit this flaw to gather intelligence or sensitive business information. Given WordPress's widespread use globally, the scope of affected systems is significant, especially for organizations that use this plugin to manage private or restricted content. Although exploitation requires authentication, contributor-level access is relatively low privilege, making this vulnerability more accessible than those requiring administrator rights. The absence of known exploits in the wild reduces immediate risk, but the vulnerability remains a concern until patched or mitigated.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they are using the B Slider- Gutenberg Slider Block for WP plugin and identify the version in use. Immediate mitigation steps include restricting contributor-level access to trusted users only and auditing user roles to minimize unnecessary privileges. Administrators should monitor shortcode usage and private post access logs for suspicious activity. Since no official patch is currently linked, organizations can implement temporary workarounds such as disabling the 'bsb-slider' shortcode or removing the plugin until a fix is released. Custom code can be added to enforce stricter access controls on shortcode rendering, ensuring private posts are not exposed to unauthorized users. Regularly updating WordPress core and plugins, subscribing to vendor security advisories, and applying patches promptly once available are critical. Additionally, implementing multi-factor authentication (MFA) for all authenticated users can reduce the risk of compromised contributor accounts being used to exploit this vulnerability.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, Italy, Spain
CVE-2024-13514: CWE-284 Improper Access Control in bplugins B Slider- Gutenberg Slider Block for WP
Description
CVE-2024-13514 is a medium severity vulnerability in the B Slider- Gutenberg Slider Block for WordPress plugin that allows authenticated users with Contributor-level access or higher to expose private post data via the 'bsb-slider' shortcode. The flaw arises from improper access control, permitting unauthorized data extraction from private posts. Exploitation requires no user interaction but does require authentication at a contributor level or above. The vulnerability affects all versions up to and including 1. 9. 5 of the plugin. Although no known exploits are currently in the wild, the risk lies in unauthorized information disclosure within WordPress sites using this plugin. Organizations using this plugin should prioritize patching or mitigating this issue to prevent data leakage. The CVSS score is 4. 3, reflecting limited impact on confidentiality and no impact on integrity or availability.
AI-Powered Analysis
Technical Analysis
CVE-2024-13514 identifies an improper access control vulnerability (CWE-284) in the B Slider- Gutenberg Slider Block for WordPress plugin, specifically affecting all versions up to 1.9.5. The vulnerability is triggered via the 'bsb-slider' shortcode, which lacks sufficient restrictions on which posts can be included. This flaw enables authenticated users with Contributor-level permissions or higher to access private post data that should normally be restricted. The issue stems from the plugin's failure to enforce proper authorization checks when rendering content through the shortcode, thereby exposing sensitive information. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score of 4.3 reflects a low complexity attack vector (network), low attack complexity, and privileges required at the contributor level, with no user interaction needed. The impact is limited to confidentiality, with no effect on integrity or availability. No patches or official fixes have been linked yet, and no known exploits are reported in the wild. This vulnerability is particularly relevant for WordPress sites that use the B Slider plugin to manage private content, as it could lead to unauthorized data disclosure within an organization or to external attackers who have obtained contributor-level credentials.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of private post content within WordPress sites using the affected B Slider plugin. Organizations relying on this plugin for content management risk leakage of sensitive or confidential information to users who should not have access, potentially violating privacy policies and regulatory requirements. While the vulnerability does not affect data integrity or availability, the exposure of private data can lead to reputational damage, loss of trust, and potential compliance violations. Attackers or malicious insiders with contributor-level access can exploit this flaw to gather intelligence or sensitive business information. Given WordPress's widespread use globally, the scope of affected systems is significant, especially for organizations that use this plugin to manage private or restricted content. Although exploitation requires authentication, contributor-level access is relatively low privilege, making this vulnerability more accessible than those requiring administrator rights. The absence of known exploits in the wild reduces immediate risk, but the vulnerability remains a concern until patched or mitigated.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they are using the B Slider- Gutenberg Slider Block for WP plugin and identify the version in use. Immediate mitigation steps include restricting contributor-level access to trusted users only and auditing user roles to minimize unnecessary privileges. Administrators should monitor shortcode usage and private post access logs for suspicious activity. Since no official patch is currently linked, organizations can implement temporary workarounds such as disabling the 'bsb-slider' shortcode or removing the plugin until a fix is released. Custom code can be added to enforce stricter access controls on shortcode rendering, ensuring private posts are not exposed to unauthorized users. Regularly updating WordPress core and plugins, subscribing to vendor security advisories, and applying patches promptly once available are critical. Additionally, implementing multi-factor authentication (MFA) for all authenticated users can reduce the risk of compromised contributor accounts being used to exploit this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-17T16:38:39.888Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e5cb7ef31ef0b59ef1a
Added to database: 2/25/2026, 9:49:16 PM
Last enriched: 2/26/2026, 12:28:33 AM
Last updated: 2/26/2026, 9:53:02 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.