Description
The Slider by Soliloquy – Responsive Image Slider for WordPress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.1 via the map_meta_cap. This makes it possible for authenticated attackers, with subscriber-level access and above, to extract draft slider metadata including unpublished media URLs, captions, and slider configuration authored by administrators or editors.
Published: 2026-05-22
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Slider by Soliloquy – Responsive Image Slider for WordPress plugin is vulnerable to a Sensitive Information Disclosure flaw in all versions up to 2.8.1. The flaw arises from the map_meta_cap function which allows authenticated users with subscriber-level access or higher to read draft slider metadata such as unpublished media URLs, captions, and slider configuration created by administrators or editors. The weakness is classified as CWE-200, permitting attackers to obtain confidential information about slider content without any privilege escalation.

Affected Systems

WordPress sites that use the Slider by Soliloquy plugin in any version from the earliest release up to and including 2.8.1. The vulnerability impacts users with subscriber or higher roles on those installations.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate risk level, and the vulnerability is not listed in the CISA KEV catalog nor is an EPSS score available. The attack vector is authenticated, requiring a subscriber or higher user to access the REST API endpoint that leaks slider metadata. If the REST API is exposed to the web, any authenticated user can query the endpoint and retrieve sensitive draft information, potentially compromising confidentiality and revealing draft media assets and configuration details.

Generated by OpenCVE AI on May 22, 2026 at 09:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Slider by Soliloquy plugin to the latest version (2.8.2 or newer) which removes the map_meta_cap vulnerability.
  • If an immediate upgrade is not possible, remove the capability that allows subscribers to access slider metadata by modifying user roles so that only administrators and editors retain that privilege.
  • Limit the exposure of the REST API endpoint by restricting its availability to privileged users or by blocking the endpoint for non-administrative roles using a security plugin or custom code.

Generated by OpenCVE AI on May 22, 2026 at 09:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 May 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Smub
Smub slider By Soliloquy – Responsive Image Slider For Wordpress
Wordpress
Wordpress wordpress
Vendors & Products Smub
Smub slider By Soliloquy – Responsive Image Slider For Wordpress
Wordpress
Wordpress wordpress

Fri, 22 May 2026 08:45:00 +0000

Type Values Removed Values Added
Description The Slider by Soliloquy – Responsive Image Slider for WordPress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.1 via the map_meta_cap. This makes it possible for authenticated attackers, with subscriber-level access and above, to extract draft slider metadata including unpublished media URLs, captions, and slider configuration authored by administrators or editors.
Title Slider by Soliloquy <= 2.8.1 - Authenticated (Subscriber+) Information Disclosure via REST API Endpoint
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Smub Slider By Soliloquy – Responsive Image Slider For Wordpress
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-22T13:46:24.435Z

Reserved: 2026-05-01T15:28:15.500Z

Link: CVE-2026-7636

cve-icon Vulnrichment

Updated: 2026-05-22T13:46:10.606Z

cve-icon NVD

Status : Received

Published: 2026-05-22T09:16:32.437

Modified: 2026-05-22T09:16:32.437

Link: CVE-2026-7636

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T12:37:51Z

Weaknesses