Real 3D Flipbook – 3D FlipBook, PDF FlipBook, PDF Viewer, PDF Embed…

Real 3D Flipbook – 3D FlipBook, PDF FlipBook, PDF Viewer, PDF Embed…

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2026-25423 affects the WordPress plugin Real 3D Flipbook – 3D FlipBook, PDF FlipBook, PDF Viewer, PDF Embedder (slug: real3d-flipbook-lite) in versions up to and including 4.16.4. This is a Medium-severity issue (CVSS 4.3) that can be exploited remotely over the network by an attacker who already has an authenticated WordPress account.

The key risk is that an attacker with author-level access or higher could trigger an unauthorized action in the plugin without needing additional user interaction. In practical terms, this means any compromised author account (or an author account created through weak onboarding controls) could become a stepping stone to misuse this plugin’s functionality.

Security Weakness

The underlying weakness is a missing authorization (capability) check on a plugin function. In business terms, the plugin does not consistently verify that the logged-in user is actually allowed to perform a sensitive action before it runs.

Because this is an authorization gap rather than a “public/anonymous” exploit, it is especially relevant for organizations with many contributors, agencies, or third-party vendors who have WordPress access. It also increases the blast radius when an employee’s credentials are phished or reused from another breach.

Remediation note: Based on the referenced advisory, there is no known patch available at this time. You should review the vulnerability details and apply mitigations aligned to your organization’s risk tolerance. In many cases, the safest option is to uninstall the affected plugin and replace it with an alternative that is actively maintained and can meet your compliance requirements.

Technical or Business Impacts

While the advisory does not specify the exact unauthorized action, missing authorization issues commonly translate into unauthorized changes to site content or plugin-managed assets by users who should not have that level of control. For marketing and executive stakeholders, the operational risks often include: brand damage from unexpected site changes, campaign disruption, increased incident response workload, and potential compliance concerns if content governance controls are bypassed.

If your organization relies on WordPress roles like Author for external writers, agencies, or multiple internal departments, this Medium vulnerability can create avoidable exposure. Recommended mitigations include: reducing the number of users with Author (or higher) access, enforcing least-privilege roles, strengthening authentication (MFA), reviewing recent user additions and role changes, and closely monitoring admin activity logs for unusual changes until a patch exists or the plugin is removed.

Similar attacks (real-world examples): Authorization and access-control weaknesses in web platforms are a recurring driver of website compromise and business disruption. Examples include the 2023 MOVEit Transfer mass exploitation impacting many organizations (CISA advisory AA23-158A), the 2021 Accellion FTA incidents affecting data transfers (CISA advisory AA21-055A), and the 2017 Equifax breach tied to an unpatched web application vulnerability (FTC Equifax settlement overview).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers