Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12018: CWE-862 Missing Authorization in aliakro Snippet Shortcodes

0
Medium
VulnerabilityCVE-2024-12018cvecve-2024-12018cwe-862
Published: Thu Dec 12 2024 (12/12/2024, 05:24:20 UTC)
Source: CVE Database V5
Vendor/Project: aliakro
Product: Snippet Shortcodes

Description

CVE-2024-12018 is a medium severity vulnerability in the aliakro Snippet Shortcodes WordPress plugin affecting all versions up to 4. 1. 6. It allows authenticated users with Subscriber-level access or higher to delete shortcode entries without proper authorization due to a missing authorization check. Although a nonce is used for authentication, its value is leaked, enabling exploitation without additional user interaction. The vulnerability impacts the integrity of shortcode data but does not affect confidentiality or availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized shortcode deletions that could disrupt site functionality or content management. Countries with significant WordPress usage and large web hosting markets are most at risk. The CVSS score is 4.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:12:55 UTC

Technical Analysis

CVE-2024-12018 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the aliakro Snippet Shortcodes plugin for WordPress in all versions up to and including 4.1.6. The core issue arises from the plugin's failure to properly authorize requests to delete shortcodes. While the plugin implements a nonce mechanism intended to authenticate such actions, the nonce value is leaked, effectively bypassing this protection. This flaw allows any authenticated user with at least Subscriber-level privileges to delete shortcode entries arbitrarily. Since Subscribers typically have minimal permissions, this vulnerability significantly lowers the attack threshold within a WordPress environment. The attack vector is remote (network accessible) and requires no user interaction beyond authentication. The impact is primarily on data integrity, as unauthorized deletion of shortcodes can disrupt website content rendering or functionality dependent on those shortcodes. Confidentiality and availability are not directly impacted. No known exploits have been reported in the wild, but the vulnerability is publicly disclosed and documented in the CVE database. The CVSS v3.1 base score is 4.3, reflecting low complexity and limited impact scope. The vulnerability highlights the importance of robust authorization checks beyond nonce validation in WordPress plugins, especially for actions modifying persistent data.

Potential Impact

The vulnerability allows authenticated users with minimal privileges (Subscriber-level) to delete shortcode data, which can lead to unauthorized modification of website content and functionality. This can disrupt user experience, break site features relying on shortcodes, and potentially cause administrative overhead to restore lost data. While it does not expose sensitive information or cause denial of service, the integrity compromise can undermine trust in the affected website. For organizations relying heavily on the aliakro Snippet Shortcodes plugin to manage dynamic content, this could result in operational disruptions and increased support costs. Attackers could leverage compromised low-privilege accounts or social engineering to gain access and exploit this flaw. Although no known exploits are currently active, the public disclosure increases the risk of future exploitation. The impact is mostly limited to WordPress sites using this specific plugin, but given WordPress's widespread use, the overall affected population is significant.

Mitigation Recommendations

1. Immediately update the aliakro Snippet Shortcodes plugin to a patched version once available. Since no patch links are currently provided, monitor the vendor's official channels for updates. 2. Restrict user roles and permissions rigorously, minimizing the number of users with Subscriber-level or higher access, especially on sites where this plugin is installed. 3. Implement additional access control mechanisms at the web server or application firewall level to detect and block suspicious shortcode deletion requests. 4. Audit and monitor logs for unusual shortcode deletion activities, particularly from low-privilege accounts. 5. Consider temporarily disabling the Snippet Shortcodes plugin if it is not critical to site operations until a patch is released. 6. Educate site administrators about the risks of privilege escalation and the importance of strong authentication controls to prevent unauthorized access. 7. Employ security plugins that can detect and alert on unauthorized changes to WordPress content or plugin data. 8. Review nonce implementation practices in custom plugins or themes to avoid similar authorization bypass issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-02T14:22:13.775Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e2ab7ef31ef0b5970bd

Added to database: 2/25/2026, 9:48:26 PM

Last enriched: 2/26/2026, 7:12:55 AM

Last updated: 2/26/2026, 8:30:26 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats