Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12028: CWE-862 Missing Authorization in akirk Friends

0
Medium
VulnerabilityCVE-2024-12028cvecve-2024-12028cwe-862
Published: Fri Dec 06 2024 (12/06/2024, 08:24:55 UTC)
Source: CVE Database V5
Vendor/Project: akirk
Product: Friends

Description

CVE-2024-12028 is a medium severity vulnerability in the akirk Friends WordPress plugin (up to version 3. 2. 1) caused by missing authorization checks on several REST API endpoints. This flaw allows unauthenticated attackers to send and accept friend requests on behalf of targeted websites, enabling them to communicate as accepted friends without permission. The vulnerability does not impact confidentiality but allows limited integrity compromise by manipulating friend relationships. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently in the wild, the widespread use of WordPress and this plugin increases the risk. Organizations using this plugin should prioritize patching or implementing access controls to mitigate unauthorized API usage. Countries with large WordPress user bases and active web communities are most at risk. The CVSS score is 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:01:22 UTC

Technical Analysis

CVE-2024-12028 is a vulnerability identified in the Friends plugin developed by akirk for WordPress, affecting all versions up to and including 3.2.1. The root cause is a missing authorization (capability) check on multiple REST API endpoints, which violates CWE-862 (Missing Authorization). This security gap allows unauthenticated attackers to interact with the plugin’s friend request functionality remotely without any credentials or user interaction. Specifically, attackers can send arbitrary friend requests on behalf of another website and accept friend requests for the targeted site, effectively impersonating the site in friend communications. This unauthorized manipulation of friend relationships can lead to integrity issues, as attackers can establish trust relationships that should not exist. The vulnerability does not expose confidential data directly nor does it allow denial of service, but it undermines the integrity of social interactions managed by the plugin. The CVSS v3.1 base score is 5.3 (medium), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or availability impact, but partial integrity impact. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly by affected users.

Potential Impact

The primary impact of this vulnerability is the unauthorized manipulation of friend relationships within WordPress sites using the akirk Friends plugin. Attackers can impersonate legitimate users or websites by sending and accepting friend requests without authorization, potentially enabling further social engineering or trust-based attacks within the compromised site’s ecosystem. This could lead to unauthorized communications, misinformation, or abuse of trust mechanisms that rely on friend relationships. While there is no direct data breach or service disruption, the integrity compromise can facilitate lateral attacks or reputation damage. Organizations relying on this plugin for community or social features may face risks of user trust erosion and indirect exploitation. Since exploitation requires no authentication and can be performed remotely, the vulnerability poses a moderate risk to any WordPress site using the affected plugin. The lack of known exploits in the wild reduces immediate threat but does not eliminate future risk, especially given the popularity of WordPress globally.

Mitigation Recommendations

1. Immediate mitigation involves updating the akirk Friends plugin to a patched version once released by the vendor. Since no patch links are currently available, monitor official sources for updates. 2. As a temporary measure, restrict access to the vulnerable REST API endpoints by implementing web application firewall (WAF) rules that block unauthenticated requests targeting the Friends plugin API paths. 3. Limit REST API access to authenticated and authorized users only, using WordPress capabilities or custom access control plugins. 4. Conduct an audit of friend relationships created recently to detect suspicious or unauthorized connections and remove them. 5. Disable or uninstall the Friends plugin if it is not essential to reduce attack surface. 6. Monitor logs for unusual friend request activities or API calls indicative of exploitation attempts. 7. Educate site administrators about the risk and ensure they follow least privilege principles for user roles interacting with social features. 8. Employ security plugins that can detect and block unauthorized REST API usage. These steps collectively reduce the risk until an official patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-02T15:04:16.202Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e2ab7ef31ef0b5970d6

Added to database: 2/25/2026, 9:48:26 PM

Last enriched: 2/26/2026, 7:01:22 AM

Last updated: 2/26/2026, 9:40:00 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats