CVE-2024-1042: CWE-862 Missing Authorization in princeahmed WP Radio – Worldwide Online Radio Stations Directory for WordPress
CVE-2024-1042 is a medium severity vulnerability in the WP Radio – Worldwide Online Radio Stations Directory WordPress plugin, affecting all versions up to 3. 1. 9. It stems from missing authorization checks on multiple AJAX functions, allowing authenticated users with subscriber-level access or higher to modify plugin data without proper permissions. Attackers can import radio stations, remove countries, and alter plugin settings. This unauthorized modification can facilitate further attacks, including Cross-Site Scripting (tracked separately as CVE-2024-1041). The vulnerability does not require user interaction and can be exploited remotely over the network. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying workarounds to prevent unauthorized data manipulation and potential chained attacks.
AI Analysis
Technical Summary
CVE-2024-1042 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Radio – Worldwide Online Radio Stations Directory plugin for WordPress, maintained by princeahmed. The flaw exists in all plugin versions up to and including 3.1.9 due to the absence of proper capability checks on several AJAX endpoints. These endpoints handle critical functions such as importing radio stations, deleting country entries, and modifying plugin settings. Because the plugin fails to verify whether the authenticated user has sufficient privileges before executing these actions, any user with subscriber-level access or higher can perform unauthorized modifications. This elevates the risk of data integrity compromise and can be leveraged to facilitate further attacks, including Cross-Site Scripting vulnerabilities (noted separately as CVE-2024-1041). The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level, with an attack vector over the network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No patches are currently linked, and no active exploitation has been reported. The vulnerability highlights the importance of enforcing strict authorization checks on all AJAX handlers in WordPress plugins to prevent privilege escalation and unauthorized data manipulation.
Potential Impact
The vulnerability allows authenticated users with minimal privileges (subscriber or higher) to perform unauthorized actions that should be restricted to administrators or trusted roles. This can lead to unauthorized data modification, including importing malicious radio station entries, deleting legitimate country data, or altering plugin configurations. Such changes can degrade the integrity of the plugin’s data and functionality, potentially disrupting the user experience or enabling further attacks such as Cross-Site Scripting (CVE-2024-1041). For organizations relying on this plugin to provide online radio directories, this could result in reputational damage, loss of user trust, and potential exposure to additional web-based attacks. Since the vulnerability does not affect availability directly, denial of service is unlikely, but the scope change means that the attacker’s actions can affect resources beyond their original privileges, increasing risk. The lack of known exploits in the wild reduces immediate threat but does not eliminate risk, especially for sites with many users or weak internal controls.
Mitigation Recommendations
1. Immediately update the WP Radio plugin to a patched version once available from the vendor or plugin repository. 2. Until a patch is released, restrict user roles that have subscriber-level or higher access to trusted individuals only. 3. Implement a Web Application Firewall (WAF) with rules to monitor and block suspicious AJAX requests targeting the plugin’s endpoints. 4. Review and harden WordPress user role permissions to minimize unnecessary privileges. 5. Conduct an audit of existing radio station entries and plugin settings to detect unauthorized changes. 6. If feasible, disable or limit AJAX functionality for the plugin via custom code or security plugins to enforce authorization checks manually. 7. Monitor logs for unusual activity related to the plugin’s AJAX endpoints. 8. Educate site administrators about the risks of granting subscriber or higher access to untrusted users. 9. Consider isolating the plugin’s functionality or using alternative plugins with better security track records if timely patching is not possible.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, Brazil, France, Netherlands, Japan
CVE-2024-1042: CWE-862 Missing Authorization in princeahmed WP Radio – Worldwide Online Radio Stations Directory for WordPress
Description
CVE-2024-1042 is a medium severity vulnerability in the WP Radio – Worldwide Online Radio Stations Directory WordPress plugin, affecting all versions up to 3. 1. 9. It stems from missing authorization checks on multiple AJAX functions, allowing authenticated users with subscriber-level access or higher to modify plugin data without proper permissions. Attackers can import radio stations, remove countries, and alter plugin settings. This unauthorized modification can facilitate further attacks, including Cross-Site Scripting (tracked separately as CVE-2024-1041). The vulnerability does not require user interaction and can be exploited remotely over the network. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying workarounds to prevent unauthorized data manipulation and potential chained attacks.
AI-Powered Analysis
Technical Analysis
CVE-2024-1042 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Radio – Worldwide Online Radio Stations Directory plugin for WordPress, maintained by princeahmed. The flaw exists in all plugin versions up to and including 3.1.9 due to the absence of proper capability checks on several AJAX endpoints. These endpoints handle critical functions such as importing radio stations, deleting country entries, and modifying plugin settings. Because the plugin fails to verify whether the authenticated user has sufficient privileges before executing these actions, any user with subscriber-level access or higher can perform unauthorized modifications. This elevates the risk of data integrity compromise and can be leveraged to facilitate further attacks, including Cross-Site Scripting vulnerabilities (noted separately as CVE-2024-1041). The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level, with an attack vector over the network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No patches are currently linked, and no active exploitation has been reported. The vulnerability highlights the importance of enforcing strict authorization checks on all AJAX handlers in WordPress plugins to prevent privilege escalation and unauthorized data manipulation.
Potential Impact
The vulnerability allows authenticated users with minimal privileges (subscriber or higher) to perform unauthorized actions that should be restricted to administrators or trusted roles. This can lead to unauthorized data modification, including importing malicious radio station entries, deleting legitimate country data, or altering plugin configurations. Such changes can degrade the integrity of the plugin’s data and functionality, potentially disrupting the user experience or enabling further attacks such as Cross-Site Scripting (CVE-2024-1041). For organizations relying on this plugin to provide online radio directories, this could result in reputational damage, loss of user trust, and potential exposure to additional web-based attacks. Since the vulnerability does not affect availability directly, denial of service is unlikely, but the scope change means that the attacker’s actions can affect resources beyond their original privileges, increasing risk. The lack of known exploits in the wild reduces immediate threat but does not eliminate risk, especially for sites with many users or weak internal controls.
Mitigation Recommendations
1. Immediately update the WP Radio plugin to a patched version once available from the vendor or plugin repository. 2. Until a patch is released, restrict user roles that have subscriber-level or higher access to trusted individuals only. 3. Implement a Web Application Firewall (WAF) with rules to monitor and block suspicious AJAX requests targeting the plugin’s endpoints. 4. Review and harden WordPress user role permissions to minimize unnecessary privileges. 5. Conduct an audit of existing radio station entries and plugin settings to detect unauthorized changes. 6. If feasible, disable or limit AJAX functionality for the plugin via custom code or security plugins to enforce authorization checks manually. 7. Monitor logs for unusual activity related to the plugin’s AJAX endpoints. 8. Educate site administrators about the risks of granting subscriber or higher access to untrusted users. 9. Consider isolating the plugin’s functionality or using alternative plugins with better security track records if timely patching is not possible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-01-29T16:12:49.272Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d1eb7ef31ef0b56e11d
Added to database: 2/25/2026, 9:43:58 PM
Last enriched: 2/26/2026, 9:11:27 AM
Last updated: 2/26/2026, 9:39:27 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.