Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8676: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in bplugins B Slider- Gutenberg Slider Block for WP

0
Medium
VulnerabilityCVE-2025-8676cvecve-2025-8676cwe-200
Published: Fri Aug 15 2025 (08/15/2025, 02:24:23 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: B Slider- Gutenberg Slider Block for WP

Description

The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vulnerable to Sensitive Information Exposure in versions less than, or equal to, 2.0.0 via the get_active_plugins function. This makes it possible for authenticated attackers, with subscriber-level access and above to extract sensitive data including installed plugin information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:22:47 UTC

Technical Analysis

CVE-2025-8676 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the B Slider- Gutenberg Slider Block for WordPress plugin, specifically in versions up to and including 2.0.0. The vulnerability arises from the get_active_plugins function, which improperly exposes details about installed plugins to authenticated users with subscriber-level privileges or higher. This exposure allows these users to enumerate active plugins, revealing potentially sensitive information that could assist attackers in identifying further vulnerabilities within the WordPress environment. The vulnerability requires authentication but no additional user interaction, and it can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, indicating a medium severity level primarily due to the confidentiality impact without affecting integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is significant because plugin enumeration can be a critical step in targeted attacks, enabling adversaries to tailor exploits against known vulnerable plugins or versions. The affected product is widely used in WordPress sites that implement the B Slider- Gutenberg Slider Block, a popular slider block plugin for content presentation. The vulnerability disclosure date is August 15, 2025, and it is assigned by Wordfence.

Potential Impact

The primary impact of CVE-2025-8676 is the unauthorized disclosure of sensitive information regarding installed plugins on WordPress sites using the vulnerable B Slider plugin. This information leakage can facilitate reconnaissance by attackers, enabling them to identify vulnerable plugins or outdated versions to exploit further. Although the vulnerability does not directly compromise data integrity or availability, the confidentiality breach increases the risk of subsequent attacks such as privilege escalation, remote code execution, or site defacement if other vulnerabilities exist in the disclosed plugins. Organizations relying on this plugin may face increased risk of targeted attacks, especially if they do not have robust monitoring or patch management processes. The requirement for authenticated access limits the attack surface to users who already have some level of access, but subscriber-level permissions are common and often granted to many users, including those with minimal privileges. This makes the vulnerability relevant for multi-user WordPress environments such as membership sites, blogs with multiple contributors, or e-commerce platforms. The absence of known exploits in the wild suggests limited active exploitation currently, but the information exposure could be leveraged by attackers to develop targeted exploits. Overall, the impact is moderate but could be a stepping stone for more severe attacks if combined with other vulnerabilities.

Mitigation Recommendations

To mitigate CVE-2025-8676, organizations should first verify if they are using the B Slider- Gutenberg Slider Block for WordPress plugin at version 2.0.0 or earlier. Since no patch links are currently available, administrators should consider the following specific actions: 1) Restrict subscriber-level and higher user permissions to trusted individuals only, minimizing the number of users who can exploit this information leak. 2) Implement strict role-based access controls and audit user accounts regularly to detect unauthorized privilege escalations. 3) Employ web application firewalls (WAFs) with custom rules to monitor and block suspicious requests targeting the get_active_plugins function or related plugin enumeration attempts. 4) Monitor WordPress logs and plugin activity for unusual access patterns or attempts to enumerate plugins. 5) Consider temporarily disabling or replacing the vulnerable plugin with alternative slider plugins that do not expose sensitive information. 6) Stay updated with vendor advisories and apply patches promptly once available. 7) Harden the WordPress environment by disabling unnecessary REST API endpoints or functions that expose plugin data to authenticated users. These targeted mitigations go beyond generic advice by focusing on access control, monitoring, and proactive plugin management specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-06T16:46:50.808Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689e9c51ad5a09ad00615fb1

Added to database: 8/15/2025, 2:32:49 AM

Last enriched: 2/26/2026, 5:22:47 PM

Last updated: 3/23/2026, 4:31:42 AM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses