CVE-2024-12062: CWE-639 Authorization Bypass Through User-Controlled Key in nicheaddons Charity Addon for Elementor
CVE-2024-12062 is a medium severity vulnerability in the Charity Addon for Elementor WordPress plugin, affecting all versions up to 1. 3. 2. It allows authenticated users with Contributor-level access or higher to exploit insufficient authorization controls in the 'nacharity_elementor_template' shortcode. This flaw enables them to access private or draft posts created by Elementor that they should not be able to view, leading to unauthorized information disclosure. The vulnerability does not require user interaction and can be exploited remotely over the network. Although the impact is limited to confidentiality, it poses a risk to organizations relying on this plugin for managing sensitive content. No known exploits are currently reported in the wild. Mitigation involves restricting shortcode usage and applying access control checks to ensure users can only access posts they are authorized to view. Countries with significant WordPress usage and a high adoption of Elementor and its addons, such as the United States, United Kingdom, Germany, Australia, and Canada, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2024-12062 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Charity Addon for Elementor WordPress plugin, specifically in the 'nacharity_elementor_template' shortcode. This vulnerability arises because the plugin fails to properly restrict which posts can be included via the shortcode, allowing authenticated users with Contributor-level permissions or higher to access private or draft posts created with Elementor that they should not have access to. The flaw is due to insufficient validation of user-controlled keys that specify which post content to render, leading to unauthorized information exposure. Exploitation requires authentication but no additional user interaction, and it can be performed remotely via crafted shortcode usage. The vulnerability affects all versions up to and including 1.3.2 of the plugin. The CVSS 3.1 base score is 4.3 (medium severity), reflecting a low complexity attack vector with limited impact confined to confidentiality without affecting integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability is significant for organizations using this plugin to manage sensitive or private content, as it could lead to data leakage to unauthorized internal users.
Potential Impact
The primary impact of CVE-2024-12062 is unauthorized disclosure of private or draft content within WordPress sites using the Charity Addon for Elementor plugin. Organizations relying on this plugin to manage sensitive information, such as donor details, campaign strategies, or unpublished content, risk exposure of confidential data to users with Contributor-level access or higher who should not have such visibility. This could lead to information leakage, reputational damage, and potential compliance violations if sensitive personal or financial data is exposed. Although the vulnerability does not affect data integrity or availability, the breach of confidentiality can undermine trust and security posture. Since the exploit requires authenticated access, the threat is primarily internal or from compromised accounts. The medium severity rating reflects the moderate risk posed, but the widespread use of Elementor and its addons in nonprofit and charity sectors increases the potential attack surface globally.
Mitigation Recommendations
To mitigate CVE-2024-12062, organizations should first verify if they use the Charity Addon for Elementor plugin and identify the version in use. Until an official patch is released, administrators should restrict Contributor-level and higher user permissions carefully, limiting access to shortcode usage or disabling the vulnerable shortcode 'nacharity_elementor_template' if possible. Implement additional access control checks in the plugin code or via custom hooks to ensure that only authorized users can render private or draft posts through shortcodes. Monitoring user activities and auditing access to sensitive content can help detect exploitation attempts. Applying the principle of least privilege to user roles and regularly reviewing user permissions will reduce risk. Once a vendor patch is available, promptly update the plugin to the fixed version. Additionally, consider using web application firewalls (WAFs) with custom rules to detect and block suspicious shortcode parameters that attempt to access unauthorized posts.
Affected Countries
United States, United Kingdom, Germany, Australia, Canada, France, Netherlands, India, Brazil, South Africa
CVE-2024-12062: CWE-639 Authorization Bypass Through User-Controlled Key in nicheaddons Charity Addon for Elementor
Description
CVE-2024-12062 is a medium severity vulnerability in the Charity Addon for Elementor WordPress plugin, affecting all versions up to 1. 3. 2. It allows authenticated users with Contributor-level access or higher to exploit insufficient authorization controls in the 'nacharity_elementor_template' shortcode. This flaw enables them to access private or draft posts created by Elementor that they should not be able to view, leading to unauthorized information disclosure. The vulnerability does not require user interaction and can be exploited remotely over the network. Although the impact is limited to confidentiality, it poses a risk to organizations relying on this plugin for managing sensitive content. No known exploits are currently reported in the wild. Mitigation involves restricting shortcode usage and applying access control checks to ensure users can only access posts they are authorized to view. Countries with significant WordPress usage and a high adoption of Elementor and its addons, such as the United States, United Kingdom, Germany, Australia, and Canada, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2024-12062 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Charity Addon for Elementor WordPress plugin, specifically in the 'nacharity_elementor_template' shortcode. This vulnerability arises because the plugin fails to properly restrict which posts can be included via the shortcode, allowing authenticated users with Contributor-level permissions or higher to access private or draft posts created with Elementor that they should not have access to. The flaw is due to insufficient validation of user-controlled keys that specify which post content to render, leading to unauthorized information exposure. Exploitation requires authentication but no additional user interaction, and it can be performed remotely via crafted shortcode usage. The vulnerability affects all versions up to and including 1.3.2 of the plugin. The CVSS 3.1 base score is 4.3 (medium severity), reflecting a low complexity attack vector with limited impact confined to confidentiality without affecting integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability is significant for organizations using this plugin to manage sensitive or private content, as it could lead to data leakage to unauthorized internal users.
Potential Impact
The primary impact of CVE-2024-12062 is unauthorized disclosure of private or draft content within WordPress sites using the Charity Addon for Elementor plugin. Organizations relying on this plugin to manage sensitive information, such as donor details, campaign strategies, or unpublished content, risk exposure of confidential data to users with Contributor-level access or higher who should not have such visibility. This could lead to information leakage, reputational damage, and potential compliance violations if sensitive personal or financial data is exposed. Although the vulnerability does not affect data integrity or availability, the breach of confidentiality can undermine trust and security posture. Since the exploit requires authenticated access, the threat is primarily internal or from compromised accounts. The medium severity rating reflects the moderate risk posed, but the widespread use of Elementor and its addons in nonprofit and charity sectors increases the potential attack surface globally.
Mitigation Recommendations
To mitigate CVE-2024-12062, organizations should first verify if they use the Charity Addon for Elementor plugin and identify the version in use. Until an official patch is released, administrators should restrict Contributor-level and higher user permissions carefully, limiting access to shortcode usage or disabling the vulnerable shortcode 'nacharity_elementor_template' if possible. Implement additional access control checks in the plugin code or via custom hooks to ensure that only authorized users can render private or draft posts through shortcodes. Monitoring user activities and auditing access to sensitive content can help detect exploitation attempts. Applying the principle of least privilege to user roles and regularly reviewing user permissions will reduce risk. Once a vendor patch is available, promptly update the plugin to the fixed version. Additionally, consider using web application firewalls (WAFs) with custom rules to detect and block suspicious shortcode parameters that attempt to access unauthorized posts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-02T20:44:10.412Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e2db7ef31ef0b59736e
Added to database: 2/25/2026, 9:48:29 PM
Last enriched: 2/26/2026, 6:45:54 AM
Last updated: 2/26/2026, 9:06:45 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
UnknownCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
UnknownCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
UnknownCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
UnknownCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.