Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1042: CWE-862 Missing Authorization in princeahmed WP Radio – Worldwide Online Radio Stations Directory for WordPress

0
Medium
VulnerabilityCVE-2024-1042cvecve-2024-1042cwe-862
Published: Wed Apr 10 2024 (04/10/2024, 04:30:21 UTC)
Source: CVE Database V5
Vendor/Project: princeahmed
Product: WP Radio – Worldwide Online Radio Stations Directory for WordPress

Description

CVE-2024-1042 is a medium severity vulnerability in the WP Radio – Worldwide Online Radio Stations Directory WordPress plugin, affecting all versions up to 3. 1. 9. It stems from missing authorization checks on multiple AJAX functions, allowing authenticated users with subscriber-level access or higher to modify plugin data without proper permissions. Attackers can import radio stations, remove countries, and alter plugin settings. This unauthorized modification can facilitate further attacks, including Cross-Site Scripting (tracked separately as CVE-2024-1041). The vulnerability does not require user interaction and can be exploited remotely over the network. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying workarounds to prevent unauthorized data manipulation and potential chained attacks.

AI-Powered Analysis

AILast updated: 02/26/2026, 09:11:27 UTC

Technical Analysis

CVE-2024-1042 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Radio – Worldwide Online Radio Stations Directory plugin for WordPress, maintained by princeahmed. The flaw exists in all plugin versions up to and including 3.1.9 due to the absence of proper capability checks on several AJAX endpoints. These endpoints handle critical functions such as importing radio stations, deleting country entries, and modifying plugin settings. Because the plugin fails to verify whether the authenticated user has sufficient privileges before executing these actions, any user with subscriber-level access or higher can perform unauthorized modifications. This elevates the risk of data integrity compromise and can be leveraged to facilitate further attacks, including Cross-Site Scripting vulnerabilities (noted separately as CVE-2024-1041). The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level, with an attack vector over the network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No patches are currently linked, and no active exploitation has been reported. The vulnerability highlights the importance of enforcing strict authorization checks on all AJAX handlers in WordPress plugins to prevent privilege escalation and unauthorized data manipulation.

Potential Impact

The vulnerability allows authenticated users with minimal privileges (subscriber or higher) to perform unauthorized actions that should be restricted to administrators or trusted roles. This can lead to unauthorized data modification, including importing malicious radio station entries, deleting legitimate country data, or altering plugin configurations. Such changes can degrade the integrity of the plugin’s data and functionality, potentially disrupting the user experience or enabling further attacks such as Cross-Site Scripting (CVE-2024-1041). For organizations relying on this plugin to provide online radio directories, this could result in reputational damage, loss of user trust, and potential exposure to additional web-based attacks. Since the vulnerability does not affect availability directly, denial of service is unlikely, but the scope change means that the attacker’s actions can affect resources beyond their original privileges, increasing risk. The lack of known exploits in the wild reduces immediate threat but does not eliminate risk, especially for sites with many users or weak internal controls.

Mitigation Recommendations

1. Immediately update the WP Radio plugin to a patched version once available from the vendor or plugin repository. 2. Until a patch is released, restrict user roles that have subscriber-level or higher access to trusted individuals only. 3. Implement a Web Application Firewall (WAF) with rules to monitor and block suspicious AJAX requests targeting the plugin’s endpoints. 4. Review and harden WordPress user role permissions to minimize unnecessary privileges. 5. Conduct an audit of existing radio station entries and plugin settings to detect unauthorized changes. 6. If feasible, disable or limit AJAX functionality for the plugin via custom code or security plugins to enforce authorization checks manually. 7. Monitor logs for unusual activity related to the plugin’s AJAX endpoints. 8. Educate site administrators about the risks of granting subscriber or higher access to untrusted users. 9. Consider isolating the plugin’s functionality or using alternative plugins with better security track records if timely patching is not possible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-01-29T16:12:49.272Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d1eb7ef31ef0b56e11d

Added to database: 2/25/2026, 9:43:58 PM

Last enriched: 2/26/2026, 9:11:27 AM

Last updated: 2/26/2026, 9:39:27 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats