CVE-2025-48334

6.5 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in Woo Slider Pro WordPress plugin that allows attackers to delete arbitrary slider content without proper authentication. It affects all Woo Slider Pro installations up to version 1.12. WordPress administrators using this plugin are affected.

💻 Affected Systems

Products:
  • BinaryCarpenter Woo Slider Pro
Versions: All versions up to and including 1.12
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with Woo Slider Pro plugin active. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete all slider content across the website, causing service disruption and requiring restoration from backups.

🟠

Likely Case

Targeted deletion of specific slider content, potentially affecting e-commerce product displays and marketing content.

🟢

If Mitigated

No impact if proper authorization checks are implemented or plugin is updated.

🌐 Internet-Facing: HIGH - WordPress sites are internet-facing by default, and the vulnerability requires no authentication.
🏢 Internal Only: LOW - The vulnerability affects internet-facing WordPress installations, not internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in the 'woo_slide_pro_delete_slider' action which lacks proper authorization checks, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.13 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/woo-slider-pro-drag-drop-slider-builder-for-woocommerce/vulnerability/wordpress-woo-slider-pro-1-12-arbitrary-content-deletion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Woo Slider Pro and click 'Update Now'. 4. Verify version is 1.13 or higher.

🔧 Temporary Workarounds

Disable Woo Slider Pro Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate woo-slider-pro

Restrict Access to wp-admin

all

Limit access to WordPress admin interface to trusted IPs only

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to 'woo_slide_pro_delete_slider' action
  • Monitor and alert on unauthorized slider deletion attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Woo Slider Pro version. If version is 1.12 or lower, you are vulnerable.

Check Version:

wp plugin get woo-slider-pro --field=version

Verify Fix Applied:

After updating, verify Woo Slider Pro version shows 1.13 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=woo_slide_pro_delete_slider from unauthorized users
  • Unexpected slider deletion events in WordPress logs

Network Indicators:

  • HTTP POST requests containing 'woo_slide_pro_delete_slider' parameter

SIEM Query:

source="wordpress.log" AND "woo_slide_pro_delete_slider" AND NOT user_role="administrator"

🔗 References

📤 Share & Export