Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66157: CWE-862 Missing Authorization in merkulove Slider for Elementor

0
Medium
VulnerabilityCVE-2025-66157cvecve-2025-66157cwe-862
Published: Wed Dec 31 2025 (12/31/2025, 16:58:24 UTC)
Source: CVE Database V5
Vendor/Project: merkulove
Product: Slider for Elementor

Description

Missing Authorization vulnerability in merkulove Slider for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Slider for Elementor: from n/a through 1.0.10.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:38:15 UTC

Technical Analysis

CVE-2025-66157 identifies a Missing Authorization vulnerability (CWE-862) in the merkulove Slider for Elementor plugin, a WordPress plugin widely used to create interactive sliders on websites. The vulnerability exists due to incorrectly configured access control security levels, allowing attackers who have some level of privileges (PR:L) to perform unauthorized actions within the plugin. This could include modifying slider content, disrupting slider functionality, or potentially causing denial of service conditions. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N), making it accessible to attackers with limited privileges on the target system. The CVSS 3.1 base score of 5.4 reflects a medium severity, with impact primarily on integrity and availability, but no direct confidentiality loss. The affected versions include all versions up to 1.0.10, with no patches currently available. No known exploits have been reported in the wild, but the vulnerability's presence in a popular WordPress plugin makes it a notable risk. The vulnerability was reserved in late November 2025 and published at the end of 2025, indicating recent discovery. The lack of patches means organizations must rely on mitigating controls until updates are released. Given the plugin’s role in website presentation, exploitation could degrade user experience or deface content, impacting brand reputation and service reliability.

Potential Impact

For European organizations, the impact of CVE-2025-66157 can be significant, especially for those relying on WordPress websites with the merkulove Slider for Elementor plugin installed. Unauthorized modification of slider content can lead to misinformation, brand damage, or defacement, undermining customer trust. Denial of service or disruption of slider functionality can degrade user experience and potentially reduce website traffic or sales. While confidentiality is not directly impacted, integrity and availability concerns can affect business operations and reputation. Organizations in sectors such as e-commerce, media, and public services that use this plugin for customer-facing websites are particularly vulnerable. The medium severity score suggests that while the risk is not critical, exploitation could still cause meaningful operational disruption. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known. European organizations must consider this vulnerability in their patch management and web security strategies to prevent unauthorized access and maintain service continuity.

Mitigation Recommendations

1. Immediately audit user roles and permissions within WordPress to ensure that only trusted users have privileges that could be leveraged to exploit this vulnerability. 2. Restrict access to the WordPress admin dashboard and plugin management interfaces using IP whitelisting, VPNs, or multi-factor authentication to reduce the risk of privilege abuse. 3. Monitor website and plugin activity logs for unusual modifications or access patterns related to the Slider for Elementor plugin. 4. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin endpoints. 5. Regularly back up website data and configurations to enable quick restoration in case of exploitation. 6. Stay informed about vendor updates and apply patches promptly once they become available. 7. Consider temporarily disabling or replacing the Slider for Elementor plugin with alternative solutions if the risk is deemed unacceptable until a patch is released. 8. Conduct penetration testing focused on access control mechanisms around the plugin to identify and remediate weaknesses proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-21T11:23:13.460Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69555a03db813ff03ef4dd97

Added to database: 12/31/2025, 5:14:43 PM

Last enriched: 1/21/2026, 12:38:15 AM

Last updated: 2/7/2026, 5:26:01 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats