Description
The Lobot Slider Administrator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.6.0. This is due to missing or incorrect nonce validation on the fourty_slider_options_page function. This makes it possible for unauthenticated attackers to modify plugin slider-page configuration via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-03-21
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration changes to the Lobot Slider Administrator plugin
Action: Immediate Patch
AI Analysis

Impact

The Lobot Slider Administrator plugin for WordPress is vulnerable to Cross‑Site Request Forgery due to missing or incorrect nonce validation in the fourty_slider_options_page function. This flaw allows an unauthenticated attacker who can entice a site administrator into clicking a crafted link to modify the plugin’s slider‑page configuration without authorization. The possible impact includes unauthorized changes to how the slider displays or functions, which could alter the site’s appearance or lead to unauthorized content injection.

Affected Systems

The vulnerability affects all installations of the Lobot Slider Administrator WordPress plugin with versions up to and including 0.6.0. Users who have not upgraded beyond version 0.6.0 are potentially exposed if a site administrator is targeted by a social‑engineering attack. The affected vendor is chuckmo, and the plugin name is Lobot Slider Administrator.

Risk and Exploitability

The CVSS base score of 4.3 indicates a medium severity rating. The exploit requires an attacker to get a site administrator to submit a forged request; therefore it is not a purely remote exploitation vector and no publicly disclosed exploits are available. The vulnerability is not in the CISA KEV catalog and there is no EPSS score. Because the attacker can potentially alter settings, the overall risk is moderate, but applying the vendor’s update immediately mitigates the issue.

Generated by OpenCVE AI on March 21, 2026 at 07:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Lobot Slider Administrator plugin to the latest version released after 0.6.0

Generated by OpenCVE AI on March 21, 2026 at 07:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Chuckmo
Chuckmo lobot Slider Administrator
Wordpress
Wordpress wordpress
Vendors & Products Chuckmo
Chuckmo lobot Slider Administrator
Wordpress
Wordpress wordpress

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description The Lobot Slider Administrator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.6.0. This is due to missing or incorrect nonce validation on the fourty_slider_options_page function. This makes it possible for unauthenticated attackers to modify plugin slider-page configuration via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Lobot Slider Administrator <= 0.6.0 - Cross-Site Request Forgery to Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Chuckmo Lobot Slider Administrator
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:02:30.828Z

Reserved: 2026-02-27T14:40:15.817Z

Link: CVE-2026-3331

cve-icon Vulnrichment

Updated: 2026-03-23T15:07:39.786Z

cve-icon NVD

Status : Deferred

Published: 2026-03-21T04:17:19.090

Modified: 2026-04-24T16:27:44.277

Link: CVE-2026-3331

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:42:00Z

Weaknesses