CVE-2026-0727
Authorization Bypass in Accordion Slider Plugin Allows Metadata Modification
Publication date: 2026-02-14
Last updated on: 2026-02-14
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wp_aas | accordion_slider | to 1.4.5 (inc) |
| wp_aas | accordion | to 1.4.5 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Accordion and Accordion Slider plugin for WordPress has an authorization bypass vulnerability in all versions up to and including 1.4.5. This occurs because the plugin does not properly verify whether a user is authorized to perform certain actions in the functions 'wp_aas_save_attachment_data' and 'wp_aas_get_attachment_edit_form'.
As a result, authenticated users with contributor level access or higher can read and modify attachment metadata such as file paths, titles, captions, alt text, and custom links for any attachment on the site.
How can this vulnerability impact me? :
This vulnerability allows attackers with contributor-level access or above to read and modify sensitive attachment metadata on the WordPress site. They can change file paths, titles, captions, alt text, and custom links associated with attachments.
Such unauthorized modifications can lead to misinformation, broken links, or exposure of sensitive file information, potentially undermining the integrity and trustworthiness of the website's content.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability involves authorization bypass in the Accordion and Accordion Slider WordPress plugin versions up to 1.4.5, allowing authenticated users with contributor access or higher to read and modify attachment metadata.'}, {'type': 'paragraph', 'content': 'To detect this vulnerability on your system, you should first identify if the vulnerable plugin version is installed on your WordPress site.'}, {'type': 'list_item', 'content': "Check the installed plugin version via WordPress admin dashboard or by running a command to read the plugin version from the plugin's main file, for example:"}, {'type': 'list_item', 'content': 'grep -i "Version" wp-content/plugins/accordion-and-accordion-slider/readme.txt'}, {'type': 'list_item', 'content': 'or'}, {'type': 'list_item', 'content': 'grep -i "Version" wp-content/plugins/accordion-and-accordion-slider/accordion-slider.php'}, {'type': 'paragraph', 'content': "Additionally, monitoring for suspicious AJAX requests to the endpoints 'wp_aas_save_attachment_data' and 'wp_aas_get_attachment_edit_form' could indicate exploitation attempts, as these are the vulnerable functions."}, {'type': 'list_item', 'content': 'Example command to check web server logs for such AJAX calls:'}, {'type': 'list_item', 'content': "grep -E 'wp_aas_save_attachment_data|wp_aas_get_attachment_edit_form' /var/log/apache2/access.log"}, {'type': 'list_item', 'content': 'or'}, {'type': 'list_item', 'content': "grep -E 'wp_aas_save_attachment_data|wp_aas_get_attachment_edit_form' /var/log/nginx/access.log"}] [1]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'The primary mitigation step is to update the Accordion and Accordion Slider plugin to version 1.4.6 or later, where the authorization checks have been properly implemented.'}, {'type': 'paragraph', 'content': 'If immediate updating is not possible, restrict access to users with contributor level or higher, and monitor or block suspicious AJAX requests to the vulnerable endpoints.'}, {'type': 'paragraph', 'content': 'Additionally, review user permissions to ensure that only trusted users have contributor or higher access.'}, {'type': 'paragraph', 'content': "Implementing web application firewall (WAF) rules to block unauthorized AJAX calls to 'wp_aas_save_attachment_data' and 'wp_aas_get_attachment_edit_form' can also help mitigate exploitation."}] [1]