CVE-2024-11725: CWE-862 Missing Authorization in cozyvision1 SMS Alert Order Notifications – WooCommerce
CVE-2024-11725 is a high-severity vulnerability affecting the SMS Alert Order Notifications – WooCommerce WordPress plugin up to version 3. 7. 6. It arises from a missing authorization check in the updateWcWarrantySettings() function, allowing authenticated users with subscriber-level privileges or higher to modify arbitrary site options. Exploitation requires the presence of the woocommerce-warranty plugin and can lead to privilege escalation by changing the default user role to administrator and enabling user registration, thereby granting attackers administrative access. The vulnerability has a CVSS score of 8. 8, indicating critical impacts on confidentiality, integrity, and availability without requiring user interaction. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized site takeover.
AI Analysis
Technical Summary
CVE-2024-11725 is a vulnerability classified under CWE-862 (Missing Authorization) found in the SMS Alert Order Notifications – WooCommerce plugin for WordPress, specifically in the updateWcWarrantySettings() function. This function lacks proper capability checks, allowing any authenticated user with subscriber-level access or higher to update arbitrary WordPress options. The vulnerability is exploitable only if the woocommerce-warranty plugin is installed, as it targets warranty-related settings. Attackers can exploit this flaw to escalate privileges by modifying the default user role to administrator and enabling user registration, thereby creating new admin accounts without legitimate authorization. The vulnerability affects all versions up to and including 3.7.6. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, privileges required at a low level, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are known, the ease of exploitation and potential for complete site compromise make this a critical threat for affected WordPress sites. The vulnerability was publicly disclosed in January 2025, with no official patch links available at the time of reporting.
Potential Impact
The impact of CVE-2024-11725 is severe for organizations using the vulnerable plugin alongside the woocommerce-warranty plugin. Exploitation allows attackers with minimal privileges to gain full administrative control over the WordPress site, compromising confidentiality by accessing sensitive data, integrity by modifying site configurations and content, and availability by potentially disrupting site operations. This can lead to unauthorized data access, defacement, installation of backdoors or malware, and complete site takeover. E-commerce sites relying on WooCommerce are particularly at risk, as attackers could manipulate order notifications, warranty settings, and user roles, undermining customer trust and business operations. The vulnerability's network accessibility and lack of user interaction requirements increase the likelihood of exploitation, especially on sites with subscriber or higher-level users. Organizations may face reputational damage, financial loss, and regulatory consequences if exploited.
Mitigation Recommendations
To mitigate CVE-2024-11725, organizations should immediately verify if the SMS Alert Order Notifications – WooCommerce plugin and the woocommerce-warranty plugin are installed and active. If so, restrict subscriber-level user capabilities temporarily to prevent exploitation. Monitor and audit user roles and registrations for suspicious changes. Disable user registration if not required. Implement a Web Application Firewall (WAF) with custom rules to block unauthorized attempts to invoke updateWcWarrantySettings() or modify options. Regularly back up the WordPress site and database to enable recovery. Follow vendor advisories for patches or updates; if no patch is available, consider removing or replacing the vulnerable plugin. Employ the principle of least privilege by limiting user roles and capabilities. Conduct thorough security assessments and penetration testing focusing on plugin vulnerabilities. Finally, keep WordPress core, themes, and plugins updated to minimize exposure to similar vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, Brazil, France, Netherlands, Japan, South Korea
CVE-2024-11725: CWE-862 Missing Authorization in cozyvision1 SMS Alert Order Notifications – WooCommerce
Description
CVE-2024-11725 is a high-severity vulnerability affecting the SMS Alert Order Notifications – WooCommerce WordPress plugin up to version 3. 7. 6. It arises from a missing authorization check in the updateWcWarrantySettings() function, allowing authenticated users with subscriber-level privileges or higher to modify arbitrary site options. Exploitation requires the presence of the woocommerce-warranty plugin and can lead to privilege escalation by changing the default user role to administrator and enabling user registration, thereby granting attackers administrative access. The vulnerability has a CVSS score of 8. 8, indicating critical impacts on confidentiality, integrity, and availability without requiring user interaction. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized site takeover.
AI-Powered Analysis
Technical Analysis
CVE-2024-11725 is a vulnerability classified under CWE-862 (Missing Authorization) found in the SMS Alert Order Notifications – WooCommerce plugin for WordPress, specifically in the updateWcWarrantySettings() function. This function lacks proper capability checks, allowing any authenticated user with subscriber-level access or higher to update arbitrary WordPress options. The vulnerability is exploitable only if the woocommerce-warranty plugin is installed, as it targets warranty-related settings. Attackers can exploit this flaw to escalate privileges by modifying the default user role to administrator and enabling user registration, thereby creating new admin accounts without legitimate authorization. The vulnerability affects all versions up to and including 3.7.6. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, privileges required at a low level, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are known, the ease of exploitation and potential for complete site compromise make this a critical threat for affected WordPress sites. The vulnerability was publicly disclosed in January 2025, with no official patch links available at the time of reporting.
Potential Impact
The impact of CVE-2024-11725 is severe for organizations using the vulnerable plugin alongside the woocommerce-warranty plugin. Exploitation allows attackers with minimal privileges to gain full administrative control over the WordPress site, compromising confidentiality by accessing sensitive data, integrity by modifying site configurations and content, and availability by potentially disrupting site operations. This can lead to unauthorized data access, defacement, installation of backdoors or malware, and complete site takeover. E-commerce sites relying on WooCommerce are particularly at risk, as attackers could manipulate order notifications, warranty settings, and user roles, undermining customer trust and business operations. The vulnerability's network accessibility and lack of user interaction requirements increase the likelihood of exploitation, especially on sites with subscriber or higher-level users. Organizations may face reputational damage, financial loss, and regulatory consequences if exploited.
Mitigation Recommendations
To mitigate CVE-2024-11725, organizations should immediately verify if the SMS Alert Order Notifications – WooCommerce plugin and the woocommerce-warranty plugin are installed and active. If so, restrict subscriber-level user capabilities temporarily to prevent exploitation. Monitor and audit user roles and registrations for suspicious changes. Disable user registration if not required. Implement a Web Application Firewall (WAF) with custom rules to block unauthorized attempts to invoke updateWcWarrantySettings() or modify options. Regularly back up the WordPress site and database to enable recovery. Follow vendor advisories for patches or updates; if no patch is available, consider removing or replacing the vulnerable plugin. Employ the principle of least privilege by limiting user roles and capabilities. Conduct thorough security assessments and penetration testing focusing on plugin vulnerabilities. Finally, keep WordPress core, themes, and plugins updated to minimize exposure to similar vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-11-25T20:41:23.678Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e1bb7ef31ef0b59544a
Added to database: 2/25/2026, 9:48:11 PM
Last enriched: 2/26/2026, 6:11:35 AM
Last updated: 2/26/2026, 7:46:01 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.