Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11643: CWE-862 Missing Authorization in allaccessible Accessibility by AllAccessible

0
High
VulnerabilityCVE-2024-11643cvecve-2024-11643cwe-862
Published: Wed Dec 04 2024 (12/04/2024, 15:22:21 UTC)
Source: CVE Database V5
Vendor/Project: allaccessible
Product: Accessibility by AllAccessible

Description

CVE-2024-11643 is a high-severity vulnerability in the Accessibility by AllAccessible WordPress plugin (versions up to 1. 3. 4) caused by missing authorization checks in the 'AllAccessible_save_settings' function. Authenticated users with Subscriber-level access or higher can exploit this flaw to modify arbitrary site options, including changing the default user role to administrator and enabling user registration. This allows attackers to escalate privileges and gain full administrative control over the WordPress site without requiring user interaction. The vulnerability has a CVSS score of 8. 8, indicating critical impact on confidentiality, integrity, and availability. No public exploits are known yet, but the ease of exploitation and potential damage make it a significant threat. Organizations using this plugin should prioritize patching or applying mitigations immediately to prevent unauthorized site takeover.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:25:46 UTC

Technical Analysis

The Accessibility by AllAccessible plugin for WordPress suffers from a missing authorization check vulnerability identified as CVE-2024-11643 (CWE-862). Specifically, the 'AllAccessible_save_settings' function does not verify whether the authenticated user has the necessary capabilities to modify plugin settings. This flaw affects all versions up to and including 1.3.4. As a result, any authenticated user with at least Subscriber-level privileges can invoke this function to update arbitrary WordPress options. Attackers can exploit this to change critical settings such as the default user role for new registrations to 'administrator' and enable user registration if it was previously disabled. This leads to privilege escalation, allowing attackers to create new admin accounts and gain full control over the site. The vulnerability is remotely exploitable over the network without user interaction and requires only low privileges to initiate. The CVSS 3.1 base score is 8.8 (High), reflecting the ease of exploitation combined with the severe impact on confidentiality, integrity, and availability of the affected WordPress sites. No patches or official fixes were listed at the time of publication, and no known exploits have been observed in the wild, but the vulnerability poses a significant risk to any site using this plugin.

Potential Impact

The vulnerability allows attackers with minimal privileges (Subscriber-level) to escalate their access to full administrative control over WordPress sites using the Accessibility by AllAccessible plugin. This can lead to complete site compromise, including data theft, defacement, malware injection, and persistent backdoors. Unauthorized modification of site options undermines the integrity and availability of the website, potentially disrupting business operations and damaging reputation. Since WordPress powers a large portion of the web, sites using this plugin are at risk of targeted attacks, especially those with public user registration enabled or where attackers can create accounts. The ability to change the default role to administrator further facilitates mass exploitation by enabling attackers to register new admin users automatically. Organizations relying on this plugin face risks of data breaches, loss of customer trust, and regulatory penalties if sensitive data is exposed or manipulated.

Mitigation Recommendations

Immediate mitigation involves restricting access to the plugin's settings functions by applying custom capability checks or disabling the plugin until a vendor patch is available. Site administrators should audit user roles and permissions to ensure no unauthorized accounts have elevated privileges. Disabling user registration temporarily can reduce attack surface. Monitoring logs for suspicious option changes or new admin accounts is critical. Applying a Web Application Firewall (WAF) rule to block unauthorized POST requests targeting the vulnerable function can provide interim protection. Administrators should subscribe to vendor advisories and update the plugin promptly once a security patch is released. Additionally, implementing multi-factor authentication (MFA) for admin accounts and regularly backing up site data will help mitigate the impact of potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-11-23T00:45:36.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e18b7ef31ef0b59515a

Added to database: 2/25/2026, 9:48:08 PM

Last enriched: 2/26/2026, 6:25:46 AM

Last updated: 2/26/2026, 7:02:35 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats