Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11951: CWE-269 Improper Privilege Management in Fave Themes Homey Login Register

0
Critical
VulnerabilityCVE-2024-11951cvecve-2024-11951cwe-269
Published: Wed Mar 05 2025 (03/05/2025, 11:22:10 UTC)
Source: CVE Database V5
Vendor/Project: Fave Themes
Product: Homey Login Register

Description

CVE-2024-11951 is a critical privilege escalation vulnerability in the Homey Login Register WordPress plugin by Fave Themes, affecting all versions up to 2. 4. 0. The flaw allows unauthenticated attackers to create new user accounts with arbitrary roles, including administrator, due to improper privilege management during user registration. This enables full system compromise without any authentication or user interaction. The vulnerability has a CVSS score of 9. 8, reflecting its high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and widespread use of WordPress make this a significant threat. Organizations using this plugin should urgently update or apply mitigations to prevent unauthorized administrative access. Countries with large WordPress user bases and significant online business presence are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:56:42 UTC

Technical Analysis

CVE-2024-11951 is a critical security vulnerability classified under CWE-269 (Improper Privilege Management) found in the Homey Login Register plugin for WordPress, developed by Fave Themes. This vulnerability affects all versions up to and including 2.4.0. The core issue arises because the plugin allows users registering new accounts to specify their own user role without proper validation or restrictions. As a result, an unauthenticated attacker can exploit this flaw by creating a new account and assigning themselves the administrator role. This effectively grants them full administrative privileges on the WordPress site, enabling them to modify content, install malicious plugins, steal sensitive data, or disrupt site availability. The vulnerability requires no authentication or user interaction, making it trivially exploitable remotely over the network. The CVSS v3.1 score of 9.8 reflects the vulnerability’s critical severity, with attack vector being network, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. Despite no known exploits currently reported in the wild, the vulnerability poses a severe risk due to the popularity of WordPress and the plugin’s usage in real estate and rental property websites. The lack of a patch or update at the time of reporting increases the urgency for mitigation. This vulnerability highlights the importance of proper role assignment controls during user registration processes in web applications.

Potential Impact

The impact of CVE-2024-11951 is severe for organizations using the Homey Login Register plugin. An attacker can gain full administrative control over the affected WordPress site without any authentication, allowing them to manipulate website content, install backdoors, exfiltrate sensitive data, or disrupt services. This can lead to complete site compromise, loss of customer trust, data breaches involving personal or financial information, and potential regulatory penalties. For businesses relying on their WordPress site for e-commerce, customer engagement, or internal operations, such a compromise can cause significant financial and reputational damage. Additionally, attackers could leverage compromised sites as a foothold for further attacks within the hosting environment or network. The vulnerability’s ease of exploitation and high impact on confidentiality, integrity, and availability make it a critical risk that demands immediate attention.

Mitigation Recommendations

To mitigate CVE-2024-11951, organizations should take the following specific actions: 1) Immediately disable the Homey Login Register plugin if an update or patch is not yet available. 2) If possible, restrict user registration functionality temporarily to prevent new account creation until a fix is applied. 3) Monitor existing user accounts for unauthorized administrator accounts and remove any suspicious users. 4) Implement web application firewall (WAF) rules to block or alert on suspicious registration attempts that specify elevated roles. 5) Review and harden WordPress user role assignment policies, ensuring that user roles cannot be set or escalated during registration without administrative approval. 6) Keep WordPress core and all plugins updated regularly and subscribe to vendor security advisories for timely patching. 7) Conduct thorough security audits and penetration tests focusing on user management features. 8) Consider implementing multi-factor authentication for administrative accounts to reduce risk from compromised credentials. These steps go beyond generic advice by focusing on immediate containment, detection, and prevention specific to this plugin’s vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-11-27T23:47:56.816Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e29b7ef31ef0b596fee

Added to database: 2/25/2026, 9:48:25 PM

Last enriched: 2/26/2026, 4:56:42 AM

Last updated: 2/26/2026, 8:05:04 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats