Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11024: CWE-230 Improper Handling of Missing Values in scottopolis AppPresser – Mobile App Framework

0
Critical
VulnerabilityCVE-2024-11024cvecve-2024-11024cwe-230
Published: Tue Nov 26 2024 (11/26/2024, 11:04:29 UTC)
Source: CVE Database V5
Vendor/Project: scottopolis
Product: AppPresser – Mobile App Framework

Description

The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.6. This is due to the plugin not properly validating a user's password reset code prior to updating their password. This makes it possible for unauthenticated attackers, with knowledge of a user's email address, to reset the user's password and gain access to their account.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/09/2026, 12:10:00 UTC

Technical Analysis

CVE-2024-11024 is a critical vulnerability in the AppPresser – Mobile App Framework WordPress plugin (up to version 4.4.6) caused by improper validation of password reset codes. This weakness allows unauthenticated attackers who know a user's email address to reset that user's password without authorization, resulting in account takeover and privilege escalation. The issue stems from the plugin's failure to properly handle missing or invalid reset codes, categorized as CWE-230. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its network attack vector, low attack complexity, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability.

Potential Impact

Successful exploitation allows an unauthenticated attacker to reset any user's password by bypassing the password reset code validation. This leads to full account takeover, compromising user confidentiality, integrity, and availability. The attacker gains unauthorized access to user accounts, potentially leading to further privilege escalation and control over the affected WordPress site.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no patch or official fix information is provided, users of the AppPresser plugin should monitor the vendor's communications closely. Until a fix is available, consider disabling the password reset functionality or restricting access to it as a temporary mitigation. Avoid exposing user email addresses publicly to reduce the risk of targeted attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-11-08T13:58:15.145Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e04b7ef31ef0b593abf

Added to database: 2/25/2026, 9:47:48 PM

Last enriched: 4/9/2026, 12:10:00 PM

Last updated: 4/12/2026, 1:06:40 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses