Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12046: CWE-639 Authorization Bypass Through User-Controlled Key in nicheaddons Medical Addon for Elementor

0
Medium
VulnerabilityCVE-2024-12046cvecve-2024-12046cwe-639
Published: Tue Feb 04 2025 (02/04/2025, 07:21:00 UTC)
Source: CVE Database V5
Vendor/Project: nicheaddons
Product: Medical Addon for Elementor

Description

CVE-2024-12046 is an authorization bypass vulnerability in the Medical Addon for Elementor WordPress plugin, affecting all versions up to 1. 6. 2. It arises from an insecure direct object reference (IDOR) via the 'namedical_elementor_template' shortcode, which lacks proper validation of a user-controlled key. Authenticated users with Contributor-level access or higher can exploit this flaw to read draft, pending, and private posts that they normally should not access. The vulnerability does not require user interaction beyond authentication and has a CVSS score of 4. 3, indicating medium severity. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or implementing access controls to prevent unauthorized content disclosure. This threat primarily affects WordPress sites using the Medical Addon for Elementor plugin, with higher risk in countries where WordPress adoption is significant and healthcare-related websites are common.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:58:16 UTC

Technical Analysis

CVE-2024-12046 is a security vulnerability classified as CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Medical Addon for Elementor plugin for WordPress. This plugin, widely used to enhance medical-related website functionalities, contains an insecure direct object reference vulnerability in all versions up to and including 1.6.2. The flaw exists in the 'namedical_elementor_template' shortcode, which accepts a user-controlled key parameter without proper validation or authorization checks. As a result, authenticated users with Contributor-level privileges or higher can manipulate this key to access the content of draft, pending, and private posts that should be restricted. This bypasses normal WordPress content access controls, potentially exposing sensitive or unpublished information. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only requires privileges equivalent to a Contributor (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to confidentiality (C:L) without affecting integrity or availability. No patches or official fixes are currently linked, and no known exploits have been observed in the wild. The vulnerability was published on February 4, 2025, and assigned a CVSS v3.1 score of 4.3, indicating medium severity. The root cause is the lack of validation on the user-supplied key parameter, allowing unauthorized data access within the WordPress environment.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive content, including draft, pending, and private posts on WordPress sites using the Medical Addon for Elementor plugin. This can lead to premature exposure of unpublished medical or healthcare-related information, potentially violating privacy regulations such as HIPAA or GDPR if personal health information is involved. Organizations may suffer reputational damage, loss of trust, and legal consequences due to data leakage. Although the vulnerability does not affect data integrity or availability, the confidentiality breach can be significant, especially for healthcare providers, clinics, or medical content publishers relying on this plugin. Since exploitation requires only Contributor-level access, attackers may leverage compromised or insider accounts to escalate data exposure. The medium severity score reflects the moderate risk, but the impact can be amplified in environments with sensitive or regulated data. The lack of known exploits reduces immediate risk, but the vulnerability remains a concern until patched.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and restrict Contributor-level user permissions to the minimum necessary, ensuring that only trusted users have such access. Implement strict user role management and monitor for suspicious activity from Contributor accounts. Disable or remove the Medical Addon for Elementor plugin if it is not essential. Since no official patch is currently available, consider applying custom access control checks or filters to validate the 'namedical_elementor_template' shortcode parameters, preventing unauthorized key manipulation. Regularly audit WordPress user roles and content access logs to detect potential exploitation attempts. Stay informed about vendor updates and apply patches promptly once released. Additionally, consider deploying web application firewalls (WAFs) with rules targeting unauthorized shortcode parameter manipulation. Educate site administrators about the risks of granting elevated privileges and enforce strong authentication mechanisms to reduce the risk of account compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-02T18:25:14.567Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e2bb7ef31ef0b5972ae

Added to database: 2/25/2026, 9:48:27 PM

Last enriched: 2/26/2026, 6:58:16 AM

Last updated: 2/26/2026, 7:17:23 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats