Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0684: CWE-863 Incorrect Authorization in codepeople CP Image Store with Slideshow

0
Medium
VulnerabilityCVE-2026-0684cvecve-2026-0684cwe-863
Published: Tue Jan 13 2026 (01/13/2026, 13:49:12 UTC)
Source: CVE Database V5
Vendor/Project: codepeople
Product: CP Image Store with Slideshow

Description

The CP Image Store with Slideshow plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.9 due to a logic error in the 'cpis_admin_init' function's permission check. This makes it possible for authenticated attackers, with Contributor-level access and above, to import arbitrary products via XML, if the XML file has already been uploaded to the server.

AI-Powered Analysis

AILast updated: 01/13/2026, 14:30:14 UTC

Technical Analysis

CVE-2026-0684 is an authorization bypass vulnerability identified in the CP Image Store with Slideshow plugin for WordPress, present in all versions up to and including 1.1.9. The root cause is a logic error in the 'cpis_admin_init' function's permission check, which fails to properly restrict access to the product import functionality. This flaw allows authenticated users with Contributor-level privileges or higher to import arbitrary products via XML files, provided the XML files have already been uploaded to the server. The vulnerability does not require user interaction and can be exploited remotely over the network. While the vulnerability does not expose confidential data or cause denial of service, it compromises the integrity of the website by allowing unauthorized product imports, potentially leading to fraudulent or malicious content being added to the site. The CVSS v3.1 score is 4.3 (medium severity), reflecting low impact on confidentiality and availability but a moderate impact on integrity, with low attack complexity and requiring low privileges. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability is classified under CWE-863 (Incorrect Authorization), highlighting improper enforcement of access controls in the plugin's administrative initialization process.

Potential Impact

For European organizations, especially those operating e-commerce or content-heavy WordPress sites using the CP Image Store with Slideshow plugin, this vulnerability poses a risk to data integrity and operational trustworthiness. Unauthorized product imports could lead to the introduction of fraudulent products, misleading information, or malicious content, potentially damaging brand reputation and customer trust. Although the vulnerability does not directly compromise confidentiality or availability, the integrity breach could facilitate further attacks such as phishing or malware distribution through manipulated product listings. Organizations with Contributor-level users who have upload privileges are particularly vulnerable. The medium severity rating suggests a moderate risk, but the ease of exploitation and the widespread use of WordPress in Europe elevate the threat's significance. Additionally, regulatory frameworks like GDPR emphasize data integrity and security, so exploitation could have compliance implications if it leads to customer harm or data misuse.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit and restrict Contributor-level user permissions to prevent unauthorized access to product import features, ensuring only trusted users have upload capabilities. 2) Monitor and control XML file uploads rigorously, employing file integrity monitoring and scanning for suspicious content before processing imports. 3) Disable or remove the CP Image Store with Slideshow plugin if it is not essential to reduce the attack surface. 4) Stay alert for official patches or updates from the vendor and apply them promptly once released. 5) Implement Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized XML import requests targeting the vulnerable endpoints. 6) Conduct regular security reviews of WordPress plugins and user roles to identify and remediate similar authorization weaknesses. 7) Educate content managers and contributors about the risks of uploading unverified files and enforce strict content validation policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-07T18:36:16.239Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69664f10a60475309f2ea2d5

Added to database: 1/13/2026, 1:56:32 PM

Last enriched: 1/13/2026, 2:30:14 PM

Last updated: 1/14/2026, 6:19:14 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats