Description
The Slider Revolution plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on several functions in all versions up to, and including, 6.7.37. This makes it possible for authenticated attackers, with Contributor-level access and above, to install and activate plugin add-ons, create sliders, and download arbitrary files.
Published: 2025-10-09
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authenticated Contributor+ privilege escalation leading to arbitrary file read
Action: Apply Patch
AI Analysis

Impact

The Slider Revolution plugin for WordPress contains a missing capability check in multiple functions through version 6.7.37. This flaw allows authenticated users with Contributor-level access or higher to install and activate add‑ons, create new sliders, and download arbitrary files that the site hosts. This is a CWE‑23 vulnerability because the lack of proper path validation permits directory traversal. An attacker can therefore elevate their functional access to the site, potentially exfiltrate sensitive files or deploy malicious add‑ons that could compromise the entire WordPress installation.

Affected Systems

Revolution Slider (Slider Revolution) for WordPress is affected in all releases up to and including 6.7.37. Users running these versions should review their installation and upgrade to the latest release.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.5 and an EPSS score below 1 percent, indicating a moderate severity but a relatively low likelihood of exploitation. It is not listed in the CISA KEV catalog. Attackers only need authenticated Contributor or higher privileges; no external access is required. Once the capability check is bypassed, the attacker can read or download files and install add‑ons, enabling further compromise.

Generated by OpenCVE AI on April 22, 2026 at 14:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Slider Revolution plugin to version 6.7.38 or later following the vendor’s release notes.
  • Disable or remove the plugin if it is not required, or restrict Contributor roles so they cannot add or activate add‑ons.
  • Configure WordPress or a security solution to limit file download permissions for plugin components, preventing arbitrary file access by authenticated users.

Generated by OpenCVE AI on April 22, 2026 at 14:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Oct 2025 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Revolution Slider
Revolution Slider slider Revolution
Wordpress
Wordpress wordpress
Vendors & Products Revolution Slider
Revolution Slider slider Revolution
Wordpress
Wordpress wordpress

Thu, 09 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Oct 2025 11:30:00 +0000

Type Values Removed Values Added
Description The Slider Revolution plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on several functions in all versions up to, and including, 6.7.37. This makes it possible for authenticated attackers, with Contributor-level access and above, to install and activate plugin add-ons, create sliders, and download arbitrary files.
Title Slider Revolution <= 6.7.37 - Missing Authorization to Authenticated (Contributor+) Arbitrary File Read
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Revolution Slider Slider Revolution
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:49:15.864Z

Reserved: 2025-09-10T21:30:22.983Z

Link: CVE-2025-10249

cve-icon Vulnrichment

Updated: 2025-10-09T14:46:34.152Z

cve-icon NVD

Status : Deferred

Published: 2025-10-09T12:15:34.873

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10249

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:15:20Z

Weaknesses