Description
The CP Image Store with Slideshow plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.9 due to a logic error in the 'cpis_admin_init' function's permission check. This makes it possible for authenticated attackers, with Contributor-level access and above, to import arbitrary products via XML, if the XML file has already been uploaded to the server.
Published: 2026-01-13
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization bypass allowing authenticated users with Contributor or higher rights to import arbitrary products via XML
Action: Patch
AI Analysis

Impact

A logic error in the permission check performed by the 'cpis_admin_init' function permits authenticated users with Contributor level access or higher to import arbitrary products using XML files that have already been uploaded to the server. This flaw effectively grants them the ability to alter product data within the plugin, potentially introducing malicious or malformed content. The vulnerability is limited to the import functionality; it does not grant arbitrary code execution or full administrative control over the site.

Affected Systems

WordPress sites running the CP Image Store with Slideshow plugin version 1.1.9 or earlier, released by the vendor codepeople. These installations expose the import feature to unauthenticated product modification by any user with Contributor privileges or higher.

Risk and Exploitability

The CVSS score of 4.3 places the vulnerability in the moderate severity range, while the EPSS score of less than 1% indicates a very low probability of exploitation in the wild. The flaw is not listed in the CISA KEV catalog. Exploitation requires an existing authenticated account with at least Contributor role, which is typically sufficient for site contributors. An attacker would need to have the XML file already uploaded or upload a new one, then trigger the import routine. Due to the need for legitimate WordPress authentication and the absence of a remote code execution path, the overall risk to the site is considered moderate but not high.

Generated by OpenCVE AI on April 15, 2026 at 21:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the CP Image Store with Slideshow plugin to a version newer than 1.1.9 to remove the bug.
  • Delete any XML files that were previously uploaded to the server that could be leveraged for import.
  • If possible, disable the XML import feature or limit Contributor roles from performing product imports to prevent unauthorized product manipulation.

Generated by OpenCVE AI on April 15, 2026 at 21:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Codepeople
Codepeople cp Image Store With Slideshow
Wordpress
Wordpress wordpress
Vendors & Products Codepeople
Codepeople cp Image Store With Slideshow
Wordpress
Wordpress wordpress

Tue, 13 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 14:00:00 +0000

Type Values Removed Values Added
Description The CP Image Store with Slideshow plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.9 due to a logic error in the 'cpis_admin_init' function's permission check. This makes it possible for authenticated attackers, with Contributor-level access and above, to import arbitrary products via XML, if the XML file has already been uploaded to the server.
Title CP Image Store with Slideshow <= 1.1.9 - Missing Authorization to Authenticated (Contributor+) Arbitrary Product Import
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Codepeople Cp Image Store With Slideshow
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:43:13.418Z

Reserved: 2026-01-07T18:36:16.239Z

Link: CVE-2026-0684

cve-icon Vulnrichment

Updated: 2026-01-13T14:13:50.331Z

cve-icon NVD

Status : Deferred

Published: 2026-01-13T14:16:38.053

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0684

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T22:00:06Z

Weaknesses