CVE-2024-12028: CWE-862 Missing Authorization in akirk Friends
CVE-2024-12028 is a medium severity vulnerability in the akirk Friends WordPress plugin (up to version 3. 2. 1) caused by missing authorization checks on several REST API endpoints. This flaw allows unauthenticated attackers to send and accept friend requests on behalf of targeted websites, enabling them to communicate as accepted friends without permission. The vulnerability does not impact confidentiality but allows limited integrity compromise by manipulating friend relationships. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently in the wild, the widespread use of WordPress and this plugin increases the risk. Organizations using this plugin should prioritize patching or implementing access controls to mitigate unauthorized API usage. Countries with large WordPress user bases and active web communities are most at risk. The CVSS score is 5.
AI Analysis
Technical Summary
CVE-2024-12028 is a vulnerability identified in the Friends plugin developed by akirk for WordPress, affecting all versions up to and including 3.2.1. The root cause is a missing authorization (capability) check on multiple REST API endpoints, which violates CWE-862 (Missing Authorization). This security gap allows unauthenticated attackers to interact with the plugin’s friend request functionality remotely without any credentials or user interaction. Specifically, attackers can send arbitrary friend requests on behalf of another website and accept friend requests for the targeted site, effectively impersonating the site in friend communications. This unauthorized manipulation of friend relationships can lead to integrity issues, as attackers can establish trust relationships that should not exist. The vulnerability does not expose confidential data directly nor does it allow denial of service, but it undermines the integrity of social interactions managed by the plugin. The CVSS v3.1 base score is 5.3 (medium), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or availability impact, but partial integrity impact. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly by affected users.
Potential Impact
The primary impact of this vulnerability is the unauthorized manipulation of friend relationships within WordPress sites using the akirk Friends plugin. Attackers can impersonate legitimate users or websites by sending and accepting friend requests without authorization, potentially enabling further social engineering or trust-based attacks within the compromised site’s ecosystem. This could lead to unauthorized communications, misinformation, or abuse of trust mechanisms that rely on friend relationships. While there is no direct data breach or service disruption, the integrity compromise can facilitate lateral attacks or reputation damage. Organizations relying on this plugin for community or social features may face risks of user trust erosion and indirect exploitation. Since exploitation requires no authentication and can be performed remotely, the vulnerability poses a moderate risk to any WordPress site using the affected plugin. The lack of known exploits in the wild reduces immediate threat but does not eliminate future risk, especially given the popularity of WordPress globally.
Mitigation Recommendations
1. Immediate mitigation involves updating the akirk Friends plugin to a patched version once released by the vendor. Since no patch links are currently available, monitor official sources for updates. 2. As a temporary measure, restrict access to the vulnerable REST API endpoints by implementing web application firewall (WAF) rules that block unauthenticated requests targeting the Friends plugin API paths. 3. Limit REST API access to authenticated and authorized users only, using WordPress capabilities or custom access control plugins. 4. Conduct an audit of friend relationships created recently to detect suspicious or unauthorized connections and remove them. 5. Disable or uninstall the Friends plugin if it is not essential to reduce attack surface. 6. Monitor logs for unusual friend request activities or API calls indicative of exploitation attempts. 7. Educate site administrators about the risk and ensure they follow least privilege principles for user roles interacting with social features. 8. Employ security plugins that can detect and block unauthorized REST API usage. These steps collectively reduce the risk until an official patch is applied.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands
CVE-2024-12028: CWE-862 Missing Authorization in akirk Friends
Description
CVE-2024-12028 is a medium severity vulnerability in the akirk Friends WordPress plugin (up to version 3. 2. 1) caused by missing authorization checks on several REST API endpoints. This flaw allows unauthenticated attackers to send and accept friend requests on behalf of targeted websites, enabling them to communicate as accepted friends without permission. The vulnerability does not impact confidentiality but allows limited integrity compromise by manipulating friend relationships. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently in the wild, the widespread use of WordPress and this plugin increases the risk. Organizations using this plugin should prioritize patching or implementing access controls to mitigate unauthorized API usage. Countries with large WordPress user bases and active web communities are most at risk. The CVSS score is 5.
AI-Powered Analysis
Technical Analysis
CVE-2024-12028 is a vulnerability identified in the Friends plugin developed by akirk for WordPress, affecting all versions up to and including 3.2.1. The root cause is a missing authorization (capability) check on multiple REST API endpoints, which violates CWE-862 (Missing Authorization). This security gap allows unauthenticated attackers to interact with the plugin’s friend request functionality remotely without any credentials or user interaction. Specifically, attackers can send arbitrary friend requests on behalf of another website and accept friend requests for the targeted site, effectively impersonating the site in friend communications. This unauthorized manipulation of friend relationships can lead to integrity issues, as attackers can establish trust relationships that should not exist. The vulnerability does not expose confidential data directly nor does it allow denial of service, but it undermines the integrity of social interactions managed by the plugin. The CVSS v3.1 base score is 5.3 (medium), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or availability impact, but partial integrity impact. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly by affected users.
Potential Impact
The primary impact of this vulnerability is the unauthorized manipulation of friend relationships within WordPress sites using the akirk Friends plugin. Attackers can impersonate legitimate users or websites by sending and accepting friend requests without authorization, potentially enabling further social engineering or trust-based attacks within the compromised site’s ecosystem. This could lead to unauthorized communications, misinformation, or abuse of trust mechanisms that rely on friend relationships. While there is no direct data breach or service disruption, the integrity compromise can facilitate lateral attacks or reputation damage. Organizations relying on this plugin for community or social features may face risks of user trust erosion and indirect exploitation. Since exploitation requires no authentication and can be performed remotely, the vulnerability poses a moderate risk to any WordPress site using the affected plugin. The lack of known exploits in the wild reduces immediate threat but does not eliminate future risk, especially given the popularity of WordPress globally.
Mitigation Recommendations
1. Immediate mitigation involves updating the akirk Friends plugin to a patched version once released by the vendor. Since no patch links are currently available, monitor official sources for updates. 2. As a temporary measure, restrict access to the vulnerable REST API endpoints by implementing web application firewall (WAF) rules that block unauthenticated requests targeting the Friends plugin API paths. 3. Limit REST API access to authenticated and authorized users only, using WordPress capabilities or custom access control plugins. 4. Conduct an audit of friend relationships created recently to detect suspicious or unauthorized connections and remove them. 5. Disable or uninstall the Friends plugin if it is not essential to reduce attack surface. 6. Monitor logs for unusual friend request activities or API calls indicative of exploitation attempts. 7. Educate site administrators about the risk and ensure they follow least privilege principles for user roles interacting with social features. 8. Employ security plugins that can detect and block unauthorized REST API usage. These steps collectively reduce the risk until an official patch is applied.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-02T15:04:16.202Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e2ab7ef31ef0b5970d6
Added to database: 2/25/2026, 9:48:26 PM
Last enriched: 2/26/2026, 7:01:22 AM
Last updated: 2/26/2026, 9:40:00 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.