Skip to main content

CVE-2024-0791: CWE-862 Missing Authorization in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional

Medium
Published: Mon Feb 05 2024 (02/05/2024, 21:21:33 UTC)
Source: CVE
Vendor/Project: realmag777
Product: WOLF – WordPress Posts Bulk Editor and Manager Professional

Description

The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to unauthorized access, modification or loss of data due to a missing capability check on the wpbe_create_new_term, wpbe_update_tax_term, and wpbe_delete_tax_term functions in all versions up to, and including, 1.0.8.1. This makes it possible for authenticated attackers, with subscriber access or higher, to create, delete or modify taxonomy terms.

AI-Powered Analysis

AILast updated: 06/24/2025, 06:55:19 UTC

Technical Analysis

CVE-2024-0791 is a vulnerability identified in the WOLF – WordPress Posts Bulk Editor and Manager Professional plugin developed by realmag777. This plugin is designed to facilitate bulk editing and management of WordPress posts, including taxonomy terms such as categories and tags. The vulnerability arises from a missing authorization check (CWE-862) in critical functions: wpbe_create_new_term, wpbe_update_tax_term, and wpbe_delete_tax_term. These functions handle the creation, modification, and deletion of taxonomy terms, respectively. Due to the absence of proper capability checks, any authenticated user with subscriber-level access or higher can exploit this flaw to manipulate taxonomy terms without appropriate permissions. This unauthorized access can lead to unauthorized content categorization changes, insertion of malicious or misleading taxonomy terms, or deletion of important taxonomy data, potentially disrupting site organization and SEO. The vulnerability affects all versions up to and including 1.0.8.1 of the plugin. Notably, no patch links are currently available, and there are no known exploits in the wild as of the published date (February 5, 2024). The vulnerability does not require elevated privileges beyond subscriber-level authentication, and no user interaction beyond login is necessary. This increases the attack surface, especially on sites with multiple users or where subscriber accounts are easily obtainable. The plugin is used within WordPress environments, which are widely deployed across various sectors, including business, government, and personal websites. The missing authorization check represents a significant security oversight that could be leveraged for unauthorized content manipulation or as a foothold for further attacks within the WordPress ecosystem.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity and availability of website content managed via WordPress using the affected plugin. Unauthorized modification or deletion of taxonomy terms can disrupt website navigation, content categorization, and SEO rankings, potentially leading to loss of visitor trust and reduced web traffic. In sectors where websites serve as critical communication or e-commerce platforms, such disruptions can translate into financial losses and reputational damage. Additionally, unauthorized content changes could be used to insert misleading or malicious taxonomy terms, potentially facilitating phishing or social engineering attacks targeting site visitors. The vulnerability does not directly expose sensitive data but undermines content integrity and site management controls. Since the exploit requires only subscriber-level authentication, attackers could leverage compromised or weak user accounts to gain unauthorized access. European organizations with multi-user WordPress sites, especially those with less stringent user account controls, are at heightened risk. The lack of known exploits in the wild reduces immediate threat but does not eliminate the risk of future exploitation, especially as awareness of the vulnerability spreads. The impact is compounded in environments where the plugin is widely used and where website content integrity is critical for business operations or regulatory compliance.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the WOLF – WordPress Posts Bulk Editor and Manager Professional plugin, particularly versions up to 1.0.8.1. Until an official patch is released, administrators should consider the following specific mitigations: 1) Restrict subscriber-level user creation and enforce strong authentication policies to minimize the risk of unauthorized access. 2) Temporarily disable or remove the plugin if it is not essential to reduce the attack surface. 3) Implement strict role-based access controls and monitor user activities related to taxonomy term management. 4) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable functions. 5) Regularly review and audit taxonomy term changes for unauthorized modifications. 6) Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. 7) Consider alternative plugins with robust authorization checks if the plugin is critical to operations. These measures go beyond generic advice by focusing on user management, monitoring, and temporary risk reduction strategies specific to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-01-22T20:48:59.982Z
Cisa Enriched
true

Threat ID: 682d983fc4522896dcbf0d16

Added to database: 5/21/2025, 9:09:19 AM

Last enriched: 6/24/2025, 6:55:19 AM

Last updated: 8/12/2025, 6:27:38 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats