CVE-2026-0635
Unauthorized Data Modification in Responsive Accordion Slider Plugin
Publication date: 2026-01-14
Last updated on: 2026-01-14
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wpresponsiveaccordionslider | responsive_accordion_slider | to 1.2.2 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Responsive Accordion Slider WordPress plugin (up to version 1.2.2) is due to a missing capability check on the 'resp_accordion_silder_save_images' function. This flaw allows authenticated users with Contributor-level access or higher to modify image metadata of any slider, including titles, descriptions, alt text, and links, without proper authorization checks. [1]
How can this vulnerability impact me? :
An attacker with Contributor-level access or above can exploit this vulnerability to alter slider image metadata, potentially injecting misleading or malicious content such as incorrect titles, descriptions, or links. This unauthorized modification can affect the integrity and trustworthiness of the website's content, possibly leading to user confusion or redirection to malicious sites. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking if the Responsive Accordion Slider plugin version is 1.2.2 or earlier installed on your WordPress site. Since the vulnerability involves unauthorized modification via the AJAX action 'resp_accordion_silder_save_images', monitoring HTTP POST requests to admin-ajax.php with the action 'accordion_slider_save_images' could help detect exploitation attempts. For example, you can use network monitoring tools or commands like 'grep' on your web server logs to find POST requests containing 'action=accordion_slider_save_images'. Additionally, inspecting WordPress plugin versions can be done via WP-CLI with the command: 'wp plugin list --format=json' and checking the version of 'responsive-accordion-slider'. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Responsive Accordion Slider plugin to a version later than 1.2.2 where the missing capability check is fixed. If an update is not available, restrict Contributor-level users from accessing the plugin's image modification functionality or disable the plugin temporarily. Additionally, monitor and restrict AJAX requests to 'resp_accordion_silder_save_images' to authenticated users with appropriate capabilities. Implementing additional access controls or disabling the AJAX handler via custom code or security plugins can also help mitigate the risk. [1]