Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Flaw in Slider Revolution Plugin Exposed 4m WordPress Sites
News

Flaw in Slider Revolution Plugin Exposed 4m WordPress Sites

Team-CWDBy Team-CWDOctober 15, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A security vulnerability affecting millions of WordPress websites has been uncovered in the widely used Slider Revolution plugin.

The flaw, tracked as CVE-2025-9217, could allow users with contributor-level permissions or higher to read sensitive files stored on a site’s server.

The Arbitrary File Read issue impacts all versions of Slider Revolution up to 6.7.36. It stems from insufficient validation in two plugin parameters, “used_svg” and “used_images,” which manage the export of image and video files.

Because these functions failed to restrict file types and paths, attackers could exploit them to access any file on the server, including wp-config.php, which holds database credentials and cryptographic keys.

Security analysts rated the flaw 6.5 under the Common Vulnerability Scoring System (CVSS), classifying it as medium severity.

Discovery and Disclosure Timeline

The vulnerability was discovered by an independent researcher, “stealthcopter,” who reported it on August 11 2025 through the Wordfence Bug Bounty Program.

Wordfence verified the report and relayed details to the plugin’s developer, ThemePunch, on August 19. The developer acknowledged the issue within two days and began working on a fix.

A patched version, 6.7.37, was released on August 28. The researcher received a $656 bounty for responsibly disclosing the flaw.

Read more on WordPress plugin security vulnerabilities: Critical Flaws in WordPress Plugin Leave 10,000 Sites Vulnerable

Impact and Recommendations

Slider Revolution remains one of the most widely used slider plugins for WordPress with over 4 million active installations.

While exploiting the flaw requires authenticated access, such as a contributor account, a successful attack could expose confidential server data.

ThemePunch issued the patch nine days after disclosure, addressing the underlying file-handling weaknesses that enabled unauthorized access.

The update introduced stricter validation checks on file paths and types within the export functions, ensuring that only permitted media files can be included in zip exports. This change prevents attackers from manipulating parameters to access files outside approved directories, closing the loophole that made arbitrary file reads possible.

Security experts at Wordfence have recommended the prompt installation of the latest update to ensure website integrity and data protection.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleXWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities
Next Article AI Is Already the #1 Data Exfiltration Channel in the Enterprise
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How cybercriminals are targeting content creators

November 26, 2025

Why you should never pay to get paid

September 15, 2025

In memoriam: David Harley

November 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.