Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP

0
High
VulnerabilityCVE-2025-8418cvecve-2025-8418cwe-862
Published: Tue Aug 12 2025 (08/12/2025, 06:42:42 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: B Slider- Gutenberg Slider Block for WP

Description

The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vulnerable to Arbitrary Plugin Installation in all versions up to, and including, 1.1.30. This is due to missing capability checks on the activated_plugin function. This makes it possible for authenticated attackers, with subscriber-level access and above, to install arbitrary plugins on the server which can make remote code execution possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:07:08 UTC

Technical Analysis

The vulnerability identified as CVE-2025-8418 affects the B Slider- Gutenberg Slider Block for WordPress plugin, versions up to 1.1.30. It is classified under CWE-862, indicating missing authorization checks. Specifically, the activated_plugin function within the plugin fails to verify whether the authenticated user has the necessary capabilities to install or activate plugins. This oversight allows any authenticated user with subscriber-level privileges or higher to bypass normal WordPress permission boundaries and install arbitrary plugins. Since WordPress plugins can execute PHP code, this arbitrary plugin installation can lead to remote code execution (RCE) on the hosting server, compromising confidentiality, integrity, and availability of the affected system. The CVSS v3.1 base score is 8.8, reflecting high severity due to network attack vector, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are known yet, the vulnerability poses a critical risk given the widespread use of WordPress and the common presence of this plugin. The lack of a patch or update at the time of publication increases the urgency for defensive measures. The vulnerability is particularly dangerous because subscriber-level users are often considered low-risk and may be present in many WordPress installations, thus broadening the attack surface.

Potential Impact

This vulnerability allows attackers with minimal privileges to escalate their access dramatically by installing arbitrary plugins, which can lead to full remote code execution on the server hosting the WordPress site. The consequences include complete site takeover, data theft or destruction, defacement, insertion of backdoors, and use of the compromised server as a pivot point for further attacks. Organizations relying on WordPress for their web presence, especially those using the B Slider plugin, face risks to their brand reputation, customer trust, and regulatory compliance due to potential data breaches. The vulnerability can also be leveraged to distribute malware or ransomware, impacting availability and causing operational disruption. Since the attack requires only subscriber-level access, even sites with many registered users or contributors are at risk. The absence of a patch means that the window for exploitation remains open, increasing the likelihood of future attacks once exploit code becomes publicly available.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict access controls by limiting subscriber-level accounts and reviewing user roles to ensure that only trusted users have authenticated access. Disable or remove the B Slider- Gutenberg Slider Block plugin if it is not essential. Monitor WordPress plugin directories for unauthorized installations or activations and enable logging to detect suspicious activities related to plugin management. Employ web application firewalls (WAFs) with rules targeting plugin installation endpoints to block unauthorized requests. Consider implementing multi-factor authentication (MFA) for all authenticated users to reduce the risk of compromised credentials. Regularly back up WordPress sites and databases to enable rapid recovery in case of compromise. Stay informed about updates from the plugin vendor and apply patches immediately once available. Additionally, conduct security audits and vulnerability scans focusing on WordPress plugins to identify and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-31T14:25:45.956Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689ae392ad5a09ad002e8174

Added to database: 8/12/2025, 6:47:46 AM

Last enriched: 2/26/2026, 5:07:08 PM

Last updated: 3/22/2026, 4:53:01 PM

Views: 136

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses