VYPR
Medium severity6.5NVD Advisory· Published Jan 8, 2026· Updated Apr 23, 2026

CVE-2026-22522

CVE-2026-22522

Description

Missing Authorization vulnerability in Munir Kamal Block Slider block-slider allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Block Slider: from n/a through <= 2.2.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in WordPress Block Slider plugin <=2.2.3 allows attackers to exploit broken access controls.

## What is the vulnerability? The Block Slider plugin for WordPress lacks proper authorization checks, leading to a broken access control vulnerability [1]. This allows attackers to bypass intended security levels and perform actions that should be restricted to higher-privileged users.

## How is it exploited? The vulnerability can be exploited without authentication or with low-privileged access, enabling unprivileged users to execute functions that require higher privileges [1]. There are no specific attacker prerequisites beyond network access to the WordPress site.

Impact

Successful exploitation could allow attackers to modify site content, inject malicious code, or alter plugin settings, potentially leading to full site compromise. The vulnerability is known to be used in mass-exploit campaigns targeting thousands of websites [1].

Mitigation

Users should update the Block Slider plugin to version 2.2.4 or later, which includes a fix. If immediate update is not possible, contact your hosting provider or a web developer for assistance [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.