CVE-2024-1136: CWE-862 Missing Authorization in wpshopmart Coming Soon Page & Maintenance Mode
The Coming Soon Page & Maintenance Mode plugin for WordPress is vulnerable to unauthorized access of data due to an improperly implemented URL check in the wpsm_coming_soon_redirect function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to view a site with maintenance mode or coming-soon mode enabled to view the site's content.
AI Analysis
Technical Summary
CVE-2024-1136 is a vulnerability identified in the WordPress plugin "Coming Soon Page & Maintenance Mode" developed by wpshopmart. This plugin is widely used to display a placeholder page indicating that a website is under construction or undergoing maintenance. The vulnerability arises from an improperly implemented URL check within the function wpsm_coming_soon_redirect, which is responsible for redirecting visitors when the maintenance or coming soon mode is enabled. Due to this flawed authorization mechanism, unauthenticated attackers can bypass the intended access restrictions and view the full content of the website even when it is supposed to be hidden behind the maintenance or coming soon page. This issue affects all versions of the plugin up to and including version 2.2.1. The root cause is categorized under CWE-862 (Missing Authorization), indicating that the plugin fails to properly verify whether a user has the necessary permissions to access the underlying site content during maintenance mode. Although no known exploits are currently reported in the wild, the vulnerability could allow attackers to gather sensitive information or preview content that site owners intended to keep private during maintenance periods. The flaw does not require authentication or user interaction, making it easier for attackers to exploit. The vulnerability impacts confidentiality primarily, as unauthorized users can view protected content, but it does not directly affect the integrity or availability of the site. No official patches or updates have been linked yet, so users of the plugin should be cautious and monitor for updates from the vendor.
Potential Impact
For European organizations, this vulnerability can lead to unintended exposure of sensitive or proprietary website content during maintenance windows. This could include unpublished product information, internal communications, or client data inadvertently accessible through the maintenance mode bypass. Such exposure risks violating data protection regulations like the GDPR if personal data is involved, potentially leading to legal and reputational consequences. Additionally, attackers could use the information gathered to plan further targeted attacks such as phishing or social engineering campaigns. Organizations relying on this plugin for their public-facing websites, especially those in sectors with high confidentiality requirements (e.g., finance, healthcare, government), may face increased risk of data leakage. Although the vulnerability does not allow modification or disruption of the website, the confidentiality breach alone can have significant operational and compliance impacts.
Mitigation Recommendations
1. Immediate mitigation involves disabling the "Coming Soon Page & Maintenance Mode" plugin until a secure update is released by wpshopmart. 2. Monitor the vendor’s official channels for patches or updates addressing this vulnerability and apply them promptly. 3. Implement web application firewall (WAF) rules to restrict access to the site during maintenance periods, allowing only trusted IP addresses or authenticated users to bypass maintenance mode. 4. Use alternative maintenance mode plugins that have been verified for proper authorization controls. 5. Conduct regular security audits and penetration testing focused on access control mechanisms for all public-facing web components. 6. For sites with sensitive content, consider implementing additional authentication layers or VPN access during maintenance windows to prevent unauthorized viewing. 7. Review and limit the amount of sensitive information exposed on staging or maintenance pages to minimize potential data leakage if unauthorized access occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-1136: CWE-862 Missing Authorization in wpshopmart Coming Soon Page & Maintenance Mode
Description
The Coming Soon Page & Maintenance Mode plugin for WordPress is vulnerable to unauthorized access of data due to an improperly implemented URL check in the wpsm_coming_soon_redirect function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to view a site with maintenance mode or coming-soon mode enabled to view the site's content.
AI-Powered Analysis
Technical Analysis
CVE-2024-1136 is a vulnerability identified in the WordPress plugin "Coming Soon Page & Maintenance Mode" developed by wpshopmart. This plugin is widely used to display a placeholder page indicating that a website is under construction or undergoing maintenance. The vulnerability arises from an improperly implemented URL check within the function wpsm_coming_soon_redirect, which is responsible for redirecting visitors when the maintenance or coming soon mode is enabled. Due to this flawed authorization mechanism, unauthenticated attackers can bypass the intended access restrictions and view the full content of the website even when it is supposed to be hidden behind the maintenance or coming soon page. This issue affects all versions of the plugin up to and including version 2.2.1. The root cause is categorized under CWE-862 (Missing Authorization), indicating that the plugin fails to properly verify whether a user has the necessary permissions to access the underlying site content during maintenance mode. Although no known exploits are currently reported in the wild, the vulnerability could allow attackers to gather sensitive information or preview content that site owners intended to keep private during maintenance periods. The flaw does not require authentication or user interaction, making it easier for attackers to exploit. The vulnerability impacts confidentiality primarily, as unauthorized users can view protected content, but it does not directly affect the integrity or availability of the site. No official patches or updates have been linked yet, so users of the plugin should be cautious and monitor for updates from the vendor.
Potential Impact
For European organizations, this vulnerability can lead to unintended exposure of sensitive or proprietary website content during maintenance windows. This could include unpublished product information, internal communications, or client data inadvertently accessible through the maintenance mode bypass. Such exposure risks violating data protection regulations like the GDPR if personal data is involved, potentially leading to legal and reputational consequences. Additionally, attackers could use the information gathered to plan further targeted attacks such as phishing or social engineering campaigns. Organizations relying on this plugin for their public-facing websites, especially those in sectors with high confidentiality requirements (e.g., finance, healthcare, government), may face increased risk of data leakage. Although the vulnerability does not allow modification or disruption of the website, the confidentiality breach alone can have significant operational and compliance impacts.
Mitigation Recommendations
1. Immediate mitigation involves disabling the "Coming Soon Page & Maintenance Mode" plugin until a secure update is released by wpshopmart. 2. Monitor the vendor’s official channels for patches or updates addressing this vulnerability and apply them promptly. 3. Implement web application firewall (WAF) rules to restrict access to the site during maintenance periods, allowing only trusted IP addresses or authenticated users to bypass maintenance mode. 4. Use alternative maintenance mode plugins that have been verified for proper authorization controls. 5. Conduct regular security audits and penetration testing focused on access control mechanisms for all public-facing web components. 6. For sites with sensitive content, consider implementing additional authentication layers or VPN access during maintenance windows to prevent unauthorized viewing. 7. Review and limit the amount of sensitive information exposed on staging or maintenance pages to minimize potential data leakage if unauthorized access occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-01-31T19:05:56.198Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6f1b
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 8:06:04 PM
Last updated: 7/26/2025, 8:06:54 PM
Views: 11
Related Threats
CVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumCVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.