CVE-2026-0727
Unknown Unknown - Not Provided
Authorization Bypass in Accordion Slider Plugin Allows Metadata Modification

Publication date: 2026-02-14

Last updated on: 2026-02-14

Assigner: Wordfence

Description
The Accordion and Accordion Slider plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.4.5. This is due to the plugin not properly verifying that a user is authorized to perform an action in the 'wp_aas_save_attachment_data' and 'wp_aas_get_attachment_edit_form' functions. This makes it possible for authenticated attackers, with contributor level access and above, to read and modify attachment metadata including file paths, titles, captions, alt text, and custom links for any attachment on the site.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-14
Last Modified
2026-02-14
Generated
2026-05-07
AI Q&A
2026-02-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wp_aas accordion_slider to 1.4.5 (inc)
wp_aas accordion to 1.4.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Accordion and Accordion Slider plugin for WordPress has an authorization bypass vulnerability in all versions up to and including 1.4.5. This occurs because the plugin does not properly verify whether a user is authorized to perform certain actions in the functions 'wp_aas_save_attachment_data' and 'wp_aas_get_attachment_edit_form'.

As a result, authenticated users with contributor level access or higher can read and modify attachment metadata such as file paths, titles, captions, alt text, and custom links for any attachment on the site.


How can this vulnerability impact me? :

This vulnerability allows attackers with contributor-level access or above to read and modify sensitive attachment metadata on the WordPress site. They can change file paths, titles, captions, alt text, and custom links associated with attachments.

Such unauthorized modifications can lead to misinformation, broken links, or exposure of sensitive file information, potentially undermining the integrity and trustworthiness of the website's content.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability involves authorization bypass in the Accordion and Accordion Slider WordPress plugin versions up to 1.4.5, allowing authenticated users with contributor access or higher to read and modify attachment metadata.'}, {'type': 'paragraph', 'content': 'To detect this vulnerability on your system, you should first identify if the vulnerable plugin version is installed on your WordPress site.'}, {'type': 'list_item', 'content': "Check the installed plugin version via WordPress admin dashboard or by running a command to read the plugin version from the plugin's main file, for example:"}, {'type': 'list_item', 'content': 'grep -i "Version" wp-content/plugins/accordion-and-accordion-slider/readme.txt'}, {'type': 'list_item', 'content': 'or'}, {'type': 'list_item', 'content': 'grep -i "Version" wp-content/plugins/accordion-and-accordion-slider/accordion-slider.php'}, {'type': 'paragraph', 'content': "Additionally, monitoring for suspicious AJAX requests to the endpoints 'wp_aas_save_attachment_data' and 'wp_aas_get_attachment_edit_form' could indicate exploitation attempts, as these are the vulnerable functions."}, {'type': 'list_item', 'content': 'Example command to check web server logs for such AJAX calls:'}, {'type': 'list_item', 'content': "grep -E 'wp_aas_save_attachment_data|wp_aas_get_attachment_edit_form' /var/log/apache2/access.log"}, {'type': 'list_item', 'content': 'or'}, {'type': 'list_item', 'content': "grep -E 'wp_aas_save_attachment_data|wp_aas_get_attachment_edit_form' /var/log/nginx/access.log"}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'The primary mitigation step is to update the Accordion and Accordion Slider plugin to version 1.4.6 or later, where the authorization checks have been properly implemented.'}, {'type': 'paragraph', 'content': 'If immediate updating is not possible, restrict access to users with contributor level or higher, and monitor or block suspicious AJAX requests to the vulnerable endpoints.'}, {'type': 'paragraph', 'content': 'Additionally, review user permissions to ensure that only trusted users have contributor or higher access.'}, {'type': 'paragraph', 'content': "Implementing web application firewall (WAF) rules to block unauthorized AJAX calls to 'wp_aas_save_attachment_data' and 'wp_aas_get_attachment_edit_form' can also help mitigate exploitation."}] [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart