CVE-2026-0684: CWE-863 Incorrect Authorization in codepeople CP Image Store with Slideshow
The CP Image Store with Slideshow plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.9 due to a logic error in the 'cpis_admin_init' function's permission check. This makes it possible for authenticated attackers, with Contributor-level access and above, to import arbitrary products via XML, if the XML file has already been uploaded to the server.
AI Analysis
Technical Summary
CVE-2026-0684 is an authorization bypass vulnerability identified in the CP Image Store with Slideshow plugin for WordPress, present in all versions up to and including 1.1.9. The root cause is a logic error in the 'cpis_admin_init' function's permission check, which fails to properly restrict access to the product import functionality. This flaw allows authenticated users with Contributor-level privileges or higher to import arbitrary products via XML files, provided the XML files have already been uploaded to the server. The vulnerability does not require user interaction and can be exploited remotely over the network. While the vulnerability does not expose confidential data or cause denial of service, it compromises the integrity of the website by allowing unauthorized product imports, potentially leading to fraudulent or malicious content being added to the site. The CVSS v3.1 score is 4.3 (medium severity), reflecting low impact on confidentiality and availability but a moderate impact on integrity, with low attack complexity and requiring low privileges. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability is classified under CWE-863 (Incorrect Authorization), highlighting improper enforcement of access controls in the plugin's administrative initialization process.
Potential Impact
For European organizations, especially those operating e-commerce or content-heavy WordPress sites using the CP Image Store with Slideshow plugin, this vulnerability poses a risk to data integrity and operational trustworthiness. Unauthorized product imports could lead to the introduction of fraudulent products, misleading information, or malicious content, potentially damaging brand reputation and customer trust. Although the vulnerability does not directly compromise confidentiality or availability, the integrity breach could facilitate further attacks such as phishing or malware distribution through manipulated product listings. Organizations with Contributor-level users who have upload privileges are particularly vulnerable. The medium severity rating suggests a moderate risk, but the ease of exploitation and the widespread use of WordPress in Europe elevate the threat's significance. Additionally, regulatory frameworks like GDPR emphasize data integrity and security, so exploitation could have compliance implications if it leads to customer harm or data misuse.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit and restrict Contributor-level user permissions to prevent unauthorized access to product import features, ensuring only trusted users have upload capabilities. 2) Monitor and control XML file uploads rigorously, employing file integrity monitoring and scanning for suspicious content before processing imports. 3) Disable or remove the CP Image Store with Slideshow plugin if it is not essential to reduce the attack surface. 4) Stay alert for official patches or updates from the vendor and apply them promptly once released. 5) Implement Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized XML import requests targeting the vulnerable endpoints. 6) Conduct regular security reviews of WordPress plugins and user roles to identify and remediate similar authorization weaknesses. 7) Educate content managers and contributors about the risks of uploading unverified files and enforce strict content validation policies.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2026-0684: CWE-863 Incorrect Authorization in codepeople CP Image Store with Slideshow
Description
The CP Image Store with Slideshow plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.9 due to a logic error in the 'cpis_admin_init' function's permission check. This makes it possible for authenticated attackers, with Contributor-level access and above, to import arbitrary products via XML, if the XML file has already been uploaded to the server.
AI-Powered Analysis
Technical Analysis
CVE-2026-0684 is an authorization bypass vulnerability identified in the CP Image Store with Slideshow plugin for WordPress, present in all versions up to and including 1.1.9. The root cause is a logic error in the 'cpis_admin_init' function's permission check, which fails to properly restrict access to the product import functionality. This flaw allows authenticated users with Contributor-level privileges or higher to import arbitrary products via XML files, provided the XML files have already been uploaded to the server. The vulnerability does not require user interaction and can be exploited remotely over the network. While the vulnerability does not expose confidential data or cause denial of service, it compromises the integrity of the website by allowing unauthorized product imports, potentially leading to fraudulent or malicious content being added to the site. The CVSS v3.1 score is 4.3 (medium severity), reflecting low impact on confidentiality and availability but a moderate impact on integrity, with low attack complexity and requiring low privileges. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability is classified under CWE-863 (Incorrect Authorization), highlighting improper enforcement of access controls in the plugin's administrative initialization process.
Potential Impact
For European organizations, especially those operating e-commerce or content-heavy WordPress sites using the CP Image Store with Slideshow plugin, this vulnerability poses a risk to data integrity and operational trustworthiness. Unauthorized product imports could lead to the introduction of fraudulent products, misleading information, or malicious content, potentially damaging brand reputation and customer trust. Although the vulnerability does not directly compromise confidentiality or availability, the integrity breach could facilitate further attacks such as phishing or malware distribution through manipulated product listings. Organizations with Contributor-level users who have upload privileges are particularly vulnerable. The medium severity rating suggests a moderate risk, but the ease of exploitation and the widespread use of WordPress in Europe elevate the threat's significance. Additionally, regulatory frameworks like GDPR emphasize data integrity and security, so exploitation could have compliance implications if it leads to customer harm or data misuse.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit and restrict Contributor-level user permissions to prevent unauthorized access to product import features, ensuring only trusted users have upload capabilities. 2) Monitor and control XML file uploads rigorously, employing file integrity monitoring and scanning for suspicious content before processing imports. 3) Disable or remove the CP Image Store with Slideshow plugin if it is not essential to reduce the attack surface. 4) Stay alert for official patches or updates from the vendor and apply them promptly once released. 5) Implement Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized XML import requests targeting the vulnerable endpoints. 6) Conduct regular security reviews of WordPress plugins and user roles to identify and remediate similar authorization weaknesses. 7) Educate content managers and contributors about the risks of uploading unverified files and enforce strict content validation policies.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-07T18:36:16.239Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69664f10a60475309f2ea2d5
Added to database: 1/13/2026, 1:56:32 PM
Last enriched: 1/13/2026, 2:30:14 PM
Last updated: 1/14/2026, 6:19:14 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0717: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in lottiefile LottieFiles – Lottie block for Gutenberg
MediumCVE-2026-0680: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in vk011 Real Post Slider Lite
MediumCVE-2026-0678: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in logiceverest Shipping Rates by City for WooCommerce
MediumCVE-2026-0635: CWE-862 Missing Authorization in techknowprime Responsive Accordion Slider
MediumCVE-2026-0594: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mallsop List Site Contributors
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.