Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0684: CWE-863 Incorrect Authorization in codepeople CP Image Store with Slideshow

0
Medium
VulnerabilityCVE-2026-0684cvecve-2026-0684cwe-863
Published: Tue Jan 13 2026 (01/13/2026, 13:49:12 UTC)
Source: CVE Database V5
Vendor/Project: codepeople
Product: CP Image Store with Slideshow

Description

The CP Image Store with Slideshow plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.9 due to a logic error in the 'cpis_admin_init' function's permission check. This makes it possible for authenticated attackers, with Contributor-level access and above, to import arbitrary products via XML, if the XML file has already been uploaded to the server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:35:31 UTC

Technical Analysis

CVE-2026-0684 is a medium-severity authorization bypass vulnerability identified in the CP Image Store with Slideshow plugin for WordPress, affecting all versions up to and including 1.1.9. The root cause is a logic error in the 'cpis_admin_init' function, which incorrectly verifies user permissions before allowing product import operations. Specifically, authenticated users with Contributor-level privileges or higher can exploit this flaw to import arbitrary products via XML files that have already been uploaded to the server. This bypasses intended authorization controls, enabling unauthorized modification of product data within the plugin. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) reflects that the attack requires some privileges but no user interaction, impacts integrity but not confidentiality or availability, and affects network-exposed components. Although no public exploits are known at this time, the vulnerability poses a risk to the integrity of e-commerce content managed through this plugin. The plugin is used primarily in WordPress environments, which are widely deployed globally, especially in small to medium-sized businesses and e-commerce sites. The lack of a patch link suggests that users must monitor vendor updates or apply manual mitigations. The CWE-863 classification highlights the incorrect authorization logic as the core issue.

Potential Impact

The primary impact of CVE-2026-0684 is the unauthorized modification of product data within WordPress sites using the CP Image Store with Slideshow plugin. Attackers with Contributor-level access can import arbitrary products, potentially leading to fraudulent listings, misinformation, or manipulation of e-commerce catalogs. While confidentiality and availability are not directly affected, the integrity compromise can damage business reputation, cause financial loss, and undermine customer trust. Organizations relying on this plugin for product management are at risk of unauthorized content injection or alteration, which could be leveraged for further attacks such as phishing or malware distribution if malicious products are introduced. The vulnerability's exploitation requires authenticated access but no user interaction, making insider threats or compromised contributor accounts particularly dangerous. Given WordPress's widespread use, the scope of affected systems is significant, especially among small and medium enterprises that may not have rigorous access controls or monitoring. The absence of known exploits in the wild currently limits immediate widespread impact but does not diminish the need for prompt remediation.

Mitigation Recommendations

To mitigate CVE-2026-0684, organizations should first verify if they are using the CP Image Store with Slideshow plugin version 1.1.9 or earlier and plan to upgrade to a patched version once available. Until an official patch is released, administrators should restrict Contributor-level and higher privileges to trusted users only, minimizing the risk of exploitation. Implement strict access controls and monitor user activities related to product imports and XML file uploads. Disable or remove the plugin if it is not essential to reduce the attack surface. Additionally, consider implementing web application firewalls (WAFs) with custom rules to detect and block unauthorized XML import attempts. Regularly audit uploaded files on the server to detect suspicious XML files that could be used in exploitation. Employ logging and alerting mechanisms to identify unusual import activities promptly. Educate contributors about the risks of privilege misuse and enforce strong authentication mechanisms to prevent account compromise. Finally, stay informed about vendor updates and apply patches immediately upon release.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-07T18:36:16.239Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69664f10a60475309f2ea2d5

Added to database: 1/13/2026, 1:56:32 PM

Last enriched: 2/26/2026, 6:35:31 PM

Last updated: 3/24/2026, 12:22:04 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses