Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6726: CWE-862 Missing Authorization in krasenslavov Block Editor Gallery Slider

0
Medium
VulnerabilityCVE-2025-6726cvecve-2025-6726cwe-862
Published: Fri Jul 18 2025 (07/18/2025, 05:23:58 UTC)
Source: CVE Database V5
Vendor/Project: krasenslavov
Product: Block Editor Gallery Slider

Description

The Block Editor Gallery Slider plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the classic_gallery_slider_options() function in all versions up to, and including, 1.1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update limited post meta for arbitrary posts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:47:00 UTC

Technical Analysis

The vulnerability identified as CVE-2025-6726 affects the krasenslavov Block Editor Gallery Slider plugin for WordPress, specifically versions up to and including 1.1.1. The root cause is a missing authorization check (CWE-862) in the function classic_gallery_slider_options(), which is responsible for handling certain post meta options related to the gallery slider. Because the function does not properly verify user capabilities, any authenticated user with Subscriber-level access or higher can update limited post meta data on arbitrary posts. This means that even low-privileged users can manipulate metadata associated with posts they do not own, potentially altering how content is displayed or managed. The vulnerability does not allow for direct content creation or deletion, nor does it expose confidential information, but it compromises data integrity by enabling unauthorized modifications. The CVSS v3.1 score is 4.3 (medium), with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, indicating network exploitability, low attack complexity, requiring privileges, no user interaction, unchanged scope, no confidentiality or availability impact, but limited integrity impact. No patches or known exploits are currently available, but the vulnerability is publicly disclosed as of July 18, 2025. The plugin is used in WordPress environments, which are widely deployed globally, especially in small to medium business websites and content-heavy platforms.

Potential Impact

The primary impact of this vulnerability is unauthorized modification of post meta data by low-privileged authenticated users. This can lead to subtle content manipulation, display issues, or unauthorized changes in how galleries are presented, potentially undermining content integrity and user trust. While it does not directly expose sensitive information or cause denial of service, the ability to alter post metadata arbitrarily can be leveraged in combination with other vulnerabilities or social engineering to escalate attacks. For organizations relying on WordPress sites with multiple user roles, especially those allowing Subscriber-level access broadly, this vulnerability increases the risk of insider threats or compromised low-privilege accounts being used to tamper with site content. The scope includes any WordPress installation running the affected plugin versions, which could be substantial given WordPress’s market share. The absence of known exploits reduces immediate risk, but the vulnerability’s public disclosure means attackers may develop exploits over time.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the krasenslavov Block Editor Gallery Slider plugin and its version. If the plugin is installed, upgrade to a fixed version once available from the vendor or remove the plugin if it is not essential. In the absence of an official patch, administrators can implement compensating controls such as restricting Subscriber-level user capabilities more tightly, for example by using role management plugins to remove or limit access to post meta editing functions. Monitoring and logging changes to post metadata can help detect unauthorized modifications. Additionally, enforcing strong authentication and minimizing the number of users with Subscriber-level or higher access reduces the attack surface. Regular backups of site content and metadata will aid recovery if unauthorized changes occur. Finally, stay alert for vendor updates or security advisories regarding this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-26T14:31:00.766Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6879dc21a83201eaacef6a16

Added to database: 7/18/2025, 5:31:13 AM

Last enriched: 2/26/2026, 3:47:00 PM

Last updated: 3/23/2026, 5:29:43 AM

Views: 139

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses