CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Lifecycle Timeline
2DescriptionNVD
The Block Editor Gallery Slider plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the classic_gallery_slider_options() function in all versions up to, and including, 1.1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update limited post meta for arbitrary posts.
AnalysisAI
Block Editor Gallery Slider plugin for WordPress up to version 1.1.1 allows authenticated Subscriber-level attackers to modify post metadata for arbitrary posts due to a missing capability check in the classic_gallery_slider_options() function. The vulnerability has a CVSS score of 4.3 and requires only low-privileged authenticated access with no user interaction, but carries limited impact (data integrity only, no confidentiality or availability breach). No public exploit code or active exploitation has been identified at time of analysis.
Technical ContextAI
The vulnerability stems from CWE-862 (Missing Authorization / Improper Authorization), where the WordPress plugin fails to validate user capabilities before processing an AJAX or REST endpoint that modifies post meta. WordPress uses a capability system where Subscriber is the lowest authenticated role; a missing check on the classic_gallery_slider_options() function allows this function to execute without verifying whether the calling user should have permission to edit posts. The underlying issue is the absence of a capability check such as current_user_can('edit_post', $post_id) before allowing post metadata updates. This is common in WordPress plugins that interact with post metadata without proper authorization gates.
Affected ProductsAI
Block Editor Gallery Slider plugin for WordPress in all versions up to and including 1.1.1 is affected. The plugin is available on the official WordPress plugin repository (wordpress.org/plugins/block-editor-gallery-slider/). No specific CPE string is provided in the input data, but the vulnerability affects WordPress installations with this plugin active. The advisory references the WordPress plugin repository changeset and a Wordfence threat intelligence page for additional details.
RemediationAI
Update the Block Editor Gallery Slider plugin to a version patched after 1.1.1. The plugin developer has released a fix; site administrators should navigate to Plugins > Installed Plugins in the WordPress dashboard and update to the latest version when available. If an immediate patched release is not yet available, temporarily disable the Block Editor Gallery Slider plugin until a security update is released. Wordfence security advisories (https://www.wordfence.com/threat-intel/vulnerabilities/id/770b0401-4d05-476e-a2b1-e9e9c920f5fa) and the official WordPress plugin repository should be monitored for version updates and detailed remediation guidance.
Share
External POC / Exploit Code
Leaving vuln.today