Description
The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vulnerable to Arbitrary Plugin Installation in all versions up to, and including, 1.1.30. This is due to missing capability checks on the activated_plugin function. This makes it possible for authenticated attackers, with subscriber-level access and above, to install arbitrary plugins on the server which can make remote code execution possible.
Published: 2025-08-12
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Arbitrary Plugin Installation
Action: Immediate Patch
AI Analysis

Impact

The B Slider- Gutenberg Slider Block for WP plugin suffers from a missing capability check in the activated_plugin function, allowing authenticated users with Subscriber role or higher to install arbitrary plugins. This flaw can be leveraged to execute remote code on the WordPress site, representing a serious confidentiality, integrity, and availability threat. The weakness is classified as CWE-862, reflecting an authorization failure.

Affected Systems

The vulnerability affects the bSlider – Create Responsive Image, Post, Product, and Video Sliders plugin supplied by bplugins. All versions up to and including 1.1.30 are impacted; newer releases beyond 1.1.30 contain the fix.

Risk and Exploitability

With a high CVSS score of 8.8, the exploit would require the attacker to be authenticated within the WordPress installation, which is a relatively low effort barrier for local or compromised accounts. The EPSS score is below 1%, indicating low current exploitation activity, and the issue is not yet listed in the CISA KEV catalog. Nevertheless, any subscriber or higher role user could install malicious plugins that may lead to remote code execution.

Generated by OpenCVE AI on April 20, 2026 at 19:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the bSlider plugin to a version newer than 1.1.30, ensuring the capability checks are applied.
  • Restrict the ‘install_plugins’ capability for Subscriber-level and other non-administrative roles, using the built‑in role editor or a role‑management plugin before the upgrade.
  • Verify that the activated_plugin function now correctly checks user capabilities; if uncertain, deploy a security plugin that enforces capability checks on plugin activation.
  • Audit the current plugin inventory for any unauthorized or suspicious plugins installed through the vulnerability and remove them if present.

Generated by OpenCVE AI on April 20, 2026 at 19:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-24224 The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vulnerable to Arbitrary Plugin Installation in all versions up to, and including, 1.1.30. This is due to missing capability checks on the activated_plugin function. This makes it possible for authenticated attackers, with subscriber-level access and above, to install arbitrary plugins on the server which can make remote code execution possible.
History

Tue, 12 Aug 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 12 Aug 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 Aug 2025 06:45:00 +0000

Type Values Removed Values Added
Description The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vulnerable to Arbitrary Plugin Installation in all versions up to, and including, 1.1.30. This is due to missing capability checks on the activated_plugin function. This makes it possible for authenticated attackers, with subscriber-level access and above, to install arbitrary plugins on the server which can make remote code execution possible.
Title B Slider- Gutenberg Slider Block for WP <= 1.1.30 - Authenticated (Subscriber+) Missing Authorization to Arbitrary Plugin Installation
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:28:26.403Z

Reserved: 2025-07-31T14:25:45.956Z

Link: CVE-2025-8418

cve-icon Vulnrichment

Updated: 2025-08-12T16:05:36.591Z

cve-icon NVD

Status : Deferred

Published: 2025-08-12T07:15:30.357

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-8418

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T20:00:10Z

Weaknesses