Magic Responsive Slider and Carousel WordPress Vulnerability (Mediu…

Magic Responsive Slider and Carousel WordPress Vulnerability (Mediu…

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2025-31640 is a Medium-severity SQL Injection vulnerability (CVSS 6.5, CVE record) affecting the Magic Responsive Slider and Carousel WordPress plugin (slug: magic-carousel) in versions <= 1.4.

The key risk factor is that the attack is authenticated: an attacker needs a valid WordPress account with at least Contributor permissions (or higher). In many organizations, Contributor access is given to marketing staff, agencies, freelancers, or multiple internal users to publish or stage content—expanding the practical exposure beyond “admins only.”

The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates the attack can be performed remotely over the network, is relatively easy to execute once logged in, does not require a user to click anything, and primarily threatens confidentiality (data exposure).

Security Weakness

This issue is caused by insufficient escaping of a user-supplied parameter combined with insufficient preparation of an SQL query. In practical terms, the plugin can allow an authenticated user to manipulate a database query in ways the site owner did not intend.

Because the weakness is tied to database query handling, it can enable an attacker to append additional SQL into existing queries and potentially extract sensitive information from the WordPress database.

Technical or Business Impacts

While the severity is rated Medium, the potential business impact can be significant because the vulnerability’s CVSS indicates high confidentiality impact. Possible outcomes include unauthorized access to data stored in the database (depending on what the vulnerable query can reach), which may include information that supports your marketing operations, customer engagement, or site administration.

For business leaders and compliance teams, the most immediate concerns are data exposure risk, potential privacy and regulatory obligations if sensitive records are accessed, and the reputational damage that can follow a disclosure. This type of issue is also commonly used as a stepping stone during broader attacks—where a “lower-privilege” account (like a Contributor) is leveraged to gain deeper insight into the environment.

Remediation: Update Magic Responsive Slider and Carousel WordPress to version 1.6 or a newer patched version, as recommended by the published advisory (source).

Similar Attacks

SQL Injection is a common class of vulnerability used to access or expose database information. Public examples include:

Cloudflare overview of SQL Injection attacks (background on how SQLi is used to extract data and why it’s high-risk).

OWASP: SQL Injection (widely referenced industry guidance on impact and prevention).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers