Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66157: CWE-862 Missing Authorization in merkulove Slider for Elementor

0
Medium
VulnerabilityCVE-2025-66157cvecve-2025-66157cwe-862
Published: Wed Dec 31 2025 (12/31/2025, 16:58:24 UTC)
Source: CVE Database V5
Vendor/Project: merkulove
Product: Slider for Elementor

Description

Missing Authorization vulnerability in merkulove Slider for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Slider for Elementor: from n/a through 1.0.10.

AI-Powered Analysis

AILast updated: 12/31/2025, 17:28:49 UTC

Technical Analysis

CVE-2025-66157 identifies a Missing Authorization vulnerability (CWE-862) in the Merkulove Slider for Elementor plugin, a popular WordPress plugin used to create sliders within Elementor-built websites. The vulnerability stems from improperly configured access control mechanisms that fail to adequately restrict certain actions to authorized users only. Specifically, users with limited privileges (PR:L) can exploit this flaw to perform unauthorized operations that affect the integrity and availability of the plugin's functionality or underlying data. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) indicates that the attack can be conducted remotely over the network without user interaction, requires low complexity, and some level of privileges, but does not impact confidentiality. The vulnerability affects all versions up to 1.0.10, with no patches currently available and no known exploits in the wild. This suggests the vulnerability was recently discovered and disclosed. The lack of proper authorization checks could allow attackers to manipulate slider content or disrupt slider availability, potentially affecting website presentation and user experience. Since Elementor and its plugins are widely used in WordPress sites, this vulnerability could have a broad impact if exploited.

Potential Impact

For European organizations, the impact of this vulnerability can range from unauthorized modification of website content to denial of service conditions affecting the slider functionality. While it does not directly compromise sensitive data confidentiality, the integrity and availability of website components are at risk. This can lead to reputational damage, loss of user trust, and potential operational disruptions, especially for businesses relying heavily on their web presence for customer engagement or e-commerce. Organizations in sectors such as retail, media, and services that use WordPress with Elementor and Merkulove plugins are particularly vulnerable. Additionally, compromised websites could be leveraged as part of broader attack campaigns, including defacement or phishing. The medium severity rating suggests the threat is significant but not critical, emphasizing the need for timely remediation to prevent escalation.

Mitigation Recommendations

1. Monitor official Merkulove and Elementor channels for security updates and apply patches immediately once released. 2. In the absence of patches, restrict access to the WordPress admin area and plugin management interfaces to trusted users only, employing strong authentication and role-based access controls. 3. Conduct a thorough audit of user privileges to ensure minimal necessary permissions are granted, reducing the risk of privilege abuse. 4. Implement web application firewalls (WAF) with custom rules to detect and block suspicious requests targeting the slider plugin endpoints. 5. Regularly review website logs for unusual activity related to slider management or unauthorized modification attempts. 6. Consider temporarily disabling or replacing the vulnerable plugin if immediate patching is not possible, especially for high-risk environments. 7. Educate site administrators about the risks of privilege escalation and the importance of secure plugin management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-21T11:23:13.460Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69555a03db813ff03ef4dd97

Added to database: 12/31/2025, 5:14:43 PM

Last enriched: 12/31/2025, 5:28:49 PM

Last updated: 1/7/2026, 4:12:38 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats