Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11725: CWE-862 Missing Authorization in cozyvision1 SMS Alert Order Notifications – WooCommerce

0
High
VulnerabilityCVE-2024-11725cvecve-2024-11725cwe-862
Published: Tue Jan 07 2025 (01/07/2025, 06:40:56 UTC)
Source: CVE Database V5
Vendor/Project: cozyvision1
Product: SMS Alert Order Notifications – WooCommerce

Description

CVE-2024-11725 is a high-severity vulnerability affecting the SMS Alert Order Notifications – WooCommerce WordPress plugin up to version 3. 7. 6. It arises from a missing authorization check in the updateWcWarrantySettings() function, allowing authenticated users with subscriber-level privileges or higher to modify arbitrary site options. Exploitation requires the presence of the woocommerce-warranty plugin and can lead to privilege escalation by changing the default user role to administrator and enabling user registration, thereby granting attackers administrative access. The vulnerability has a CVSS score of 8. 8, indicating critical impacts on confidentiality, integrity, and availability without requiring user interaction. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized site takeover.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:11:35 UTC

Technical Analysis

CVE-2024-11725 is a vulnerability classified under CWE-862 (Missing Authorization) found in the SMS Alert Order Notifications – WooCommerce plugin for WordPress, specifically in the updateWcWarrantySettings() function. This function lacks proper capability checks, allowing any authenticated user with subscriber-level access or higher to update arbitrary WordPress options. The vulnerability is exploitable only if the woocommerce-warranty plugin is installed, as it targets warranty-related settings. Attackers can exploit this flaw to escalate privileges by modifying the default user role to administrator and enabling user registration, thereby creating new admin accounts without legitimate authorization. The vulnerability affects all versions up to and including 3.7.6. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, privileges required at a low level, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are known, the ease of exploitation and potential for complete site compromise make this a critical threat for affected WordPress sites. The vulnerability was publicly disclosed in January 2025, with no official patch links available at the time of reporting.

Potential Impact

The impact of CVE-2024-11725 is severe for organizations using the vulnerable plugin alongside the woocommerce-warranty plugin. Exploitation allows attackers with minimal privileges to gain full administrative control over the WordPress site, compromising confidentiality by accessing sensitive data, integrity by modifying site configurations and content, and availability by potentially disrupting site operations. This can lead to unauthorized data access, defacement, installation of backdoors or malware, and complete site takeover. E-commerce sites relying on WooCommerce are particularly at risk, as attackers could manipulate order notifications, warranty settings, and user roles, undermining customer trust and business operations. The vulnerability's network accessibility and lack of user interaction requirements increase the likelihood of exploitation, especially on sites with subscriber or higher-level users. Organizations may face reputational damage, financial loss, and regulatory consequences if exploited.

Mitigation Recommendations

To mitigate CVE-2024-11725, organizations should immediately verify if the SMS Alert Order Notifications – WooCommerce plugin and the woocommerce-warranty plugin are installed and active. If so, restrict subscriber-level user capabilities temporarily to prevent exploitation. Monitor and audit user roles and registrations for suspicious changes. Disable user registration if not required. Implement a Web Application Firewall (WAF) with custom rules to block unauthorized attempts to invoke updateWcWarrantySettings() or modify options. Regularly back up the WordPress site and database to enable recovery. Follow vendor advisories for patches or updates; if no patch is available, consider removing or replacing the vulnerable plugin. Employ the principle of least privilege by limiting user roles and capabilities. Conduct thorough security assessments and penetration testing focusing on plugin vulnerabilities. Finally, keep WordPress core, themes, and plugins updated to minimize exposure to similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-11-25T20:41:23.678Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e1bb7ef31ef0b59544a

Added to database: 2/25/2026, 9:48:11 PM

Last enriched: 2/26/2026, 6:11:35 AM

Last updated: 2/26/2026, 7:46:01 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats