Skip to main content

CVE-2024-0248: CWE-862 Missing Authorization in Unknown EazyDocs

Medium
VulnerabilityCVE-2024-0248cvecve-2024-0248cwe-862
Published: Mon Feb 12 2024 (02/12/2024, 16:05:59 UTC)
Source: CVE
Vendor/Project: Unknown
Product: EazyDocs

Description

The EazyDocs WordPress plugin before 2.4.0 re-introduced CVE-2023-6029 (https://wpscan.com/vulnerability/7a0aaf85-8130-4fd7-8f09-f8edc929597e/) in 2.3.8, allowing any authenticated users, such as subscriber to delete arbitrary posts, as well as add and delete documents/sections. The issue was partially fixed in 2.3.9.

AI-Powered Analysis

AILast updated: 07/05/2025, 08:40:15 UTC

Technical Analysis

CVE-2024-0248 is a vulnerability affecting the EazyDocs WordPress plugin, specifically version 2.3.8. This vulnerability is classified under CWE-862, which refers to missing authorization. The issue was originally introduced in version 2.3.8, effectively re-introducing a previously known vulnerability (CVE-2023-6029) that had been partially addressed in version 2.3.9. The vulnerability allows any authenticated user, including those with minimal privileges such as subscribers, to perform unauthorized actions within the plugin. These actions include deleting arbitrary posts and adding or deleting documents and sections managed by the plugin. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), limited integrity impact (I:L), and no availability impact (A:N). The vulnerability arises due to insufficient authorization checks in the plugin's code, allowing authenticated users to bypass intended access controls and manipulate content they should not be able to. No known exploits are currently reported in the wild, and no official patches or updates are linked in the provided information, though the issue was partially fixed in version 2.3.9. Organizations using EazyDocs version 2.3.8 are at risk of unauthorized content modification by low-privilege users, which could lead to content tampering, misinformation, or disruption of documentation services.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity of web content managed via the EazyDocs plugin. Unauthorized deletion or modification of documentation can disrupt internal knowledge bases, customer-facing documentation, or compliance-related content. This could lead to misinformation, operational inefficiencies, or reputational damage if public-facing documents are altered maliciously. Although the vulnerability does not directly impact confidentiality or availability, the integrity compromise can have downstream effects, such as loss of trust or regulatory scrutiny, especially in sectors with strict documentation requirements like finance, healthcare, and government. Since exploitation requires only authenticated access with low privileges, attackers could leverage compromised or low-level user accounts to escalate impact without needing administrative credentials. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often target widely used WordPress plugins. Organizations relying on EazyDocs for critical documentation should consider this vulnerability a priority for remediation to maintain content integrity and operational continuity.

Mitigation Recommendations

1. Upgrade EazyDocs Plugin: Immediately update the EazyDocs plugin to version 2.4.0 or later, where the vulnerability has been fully addressed. If upgrading is not immediately possible, avoid using version 2.3.8 and consider rolling back to a version without the vulnerability (e.g., 2.3.9 or later). 2. Restrict User Privileges: Audit and minimize the number of users with authenticated access to the WordPress backend, especially those with subscriber or low-level roles. Implement the principle of least privilege to reduce the risk of exploitation. 3. Implement Web Application Firewall (WAF): Deploy a WAF with rules to detect and block suspicious requests targeting the EazyDocs plugin endpoints, particularly those attempting unauthorized post deletions or document modifications. 4. Monitor Logs and User Activity: Enable detailed logging of user actions related to document management and monitor for unusual activities such as unexpected deletions or additions by low-privilege users. 5. Harden Authentication: Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of account compromise that could facilitate exploitation. 6. Backup Documentation: Regularly back up all documentation and posts managed by EazyDocs to enable quick restoration in case of unauthorized modifications. 7. Review Plugin Usage: Evaluate whether EazyDocs is essential and consider alternative documentation plugins with better security track records if appropriate.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-01-05T13:31:32.604Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8b2d

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 8:40:15 AM

Last updated: 8/6/2025, 1:45:11 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats