CVE-2023-51519

4.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the Soliloquy Slider WordPress plugin that allows unauthorized users to access functionality intended only for authenticated administrators. It affects all versions up to 2.7.2 of the plugin. WordPress sites using the vulnerable plugin are affected.

💻 Affected Systems

Products:
  • Slider by Soliloquy WordPress Plugin
Versions: All versions up to and including 2.7.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both free (Lite) and premium versions of the plugin. Requires WordPress installation with the vulnerable plugin active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could modify slider settings, inject malicious content, or potentially escalate privileges to gain administrative access to the WordPress site.

🟠

Likely Case

Unauthorized users can modify slider content, change settings, or access administrative functions without proper authentication.

🟢

If Mitigated

With proper access controls and authentication checks, only authorized administrators can access slider management functions.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, and the vulnerability allows unauthenticated access to administrative functions.
🏢 Internal Only: MEDIUM - Even internally, unauthorized users could access administrative functions they shouldn't have access to.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is a broken access control issue, typically requiring simple HTTP requests to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.3 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/soliloquy-lite/wordpress-slider-by-soliloquy-responsive-image-slider-for-wordpress-plugin-2-7-2-broken-access-control-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Slider by Soliloquy' and click 'Update Now'. 4. Alternatively, download version 2.7.3+ from WordPress.org and manually replace the plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Soliloquy Slider plugin until patched

wp plugin deactivate soliloquy-lite

Restrict Access via .htaccess

linux

Add access restrictions to plugin directories

Order Deny,Allow
Deny from all

🧯 If You Can't Patch

  • Remove the Soliloquy Slider plugin completely from your WordPress installation
  • Implement web application firewall (WAF) rules to block unauthorized access to plugin admin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → Slider by Soliloquy version

Check Version:

wp plugin get soliloquy-lite --field=version

Verify Fix Applied:

Verify plugin version is 2.7.3 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST/GET requests to /wp-admin/admin-ajax.php with soliloquy action parameters
  • Access to soliloquy admin endpoints from non-admin IPs/users

Network Indicators:

  • HTTP requests to soliloquy administrative endpoints without proper authentication headers

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND query_string="action=soliloquy*") AND user="-"

🔗 References

📤 Share & Export