Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12062: CWE-639 Authorization Bypass Through User-Controlled Key in nicheaddons Charity Addon for Elementor

0
Medium
VulnerabilityCVE-2024-12062cvecve-2024-12062cwe-639
Published: Tue Dec 03 2024 (12/03/2024, 09:32:01 UTC)
Source: CVE Database V5
Vendor/Project: nicheaddons
Product: Charity Addon for Elementor

Description

CVE-2024-12062 is a medium severity vulnerability in the Charity Addon for Elementor WordPress plugin, affecting all versions up to 1. 3. 2. It allows authenticated users with Contributor-level access or higher to exploit insufficient authorization controls in the 'nacharity_elementor_template' shortcode. This flaw enables them to access private or draft posts created by Elementor that they should not be able to view, leading to unauthorized information disclosure. The vulnerability does not require user interaction and can be exploited remotely over the network. Although the impact is limited to confidentiality, it poses a risk to organizations relying on this plugin for managing sensitive content. No known exploits are currently reported in the wild. Mitigation involves restricting shortcode usage and applying access control checks to ensure users can only access posts they are authorized to view. Countries with significant WordPress usage and a high adoption of Elementor and its addons, such as the United States, United Kingdom, Germany, Australia, and Canada, are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:45:54 UTC

Technical Analysis

CVE-2024-12062 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Charity Addon for Elementor WordPress plugin, specifically in the 'nacharity_elementor_template' shortcode. This vulnerability arises because the plugin fails to properly restrict which posts can be included via the shortcode, allowing authenticated users with Contributor-level permissions or higher to access private or draft posts created with Elementor that they should not have access to. The flaw is due to insufficient validation of user-controlled keys that specify which post content to render, leading to unauthorized information exposure. Exploitation requires authentication but no additional user interaction, and it can be performed remotely via crafted shortcode usage. The vulnerability affects all versions up to and including 1.3.2 of the plugin. The CVSS 3.1 base score is 4.3 (medium severity), reflecting a low complexity attack vector with limited impact confined to confidentiality without affecting integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability is significant for organizations using this plugin to manage sensitive or private content, as it could lead to data leakage to unauthorized internal users.

Potential Impact

The primary impact of CVE-2024-12062 is unauthorized disclosure of private or draft content within WordPress sites using the Charity Addon for Elementor plugin. Organizations relying on this plugin to manage sensitive information, such as donor details, campaign strategies, or unpublished content, risk exposure of confidential data to users with Contributor-level access or higher who should not have such visibility. This could lead to information leakage, reputational damage, and potential compliance violations if sensitive personal or financial data is exposed. Although the vulnerability does not affect data integrity or availability, the breach of confidentiality can undermine trust and security posture. Since the exploit requires authenticated access, the threat is primarily internal or from compromised accounts. The medium severity rating reflects the moderate risk posed, but the widespread use of Elementor and its addons in nonprofit and charity sectors increases the potential attack surface globally.

Mitigation Recommendations

To mitigate CVE-2024-12062, organizations should first verify if they use the Charity Addon for Elementor plugin and identify the version in use. Until an official patch is released, administrators should restrict Contributor-level and higher user permissions carefully, limiting access to shortcode usage or disabling the vulnerable shortcode 'nacharity_elementor_template' if possible. Implement additional access control checks in the plugin code or via custom hooks to ensure that only authorized users can render private or draft posts through shortcodes. Monitoring user activities and auditing access to sensitive content can help detect exploitation attempts. Applying the principle of least privilege to user roles and regularly reviewing user permissions will reduce risk. Once a vendor patch is available, promptly update the plugin to the fixed version. Additionally, consider using web application firewalls (WAFs) with custom rules to detect and block suspicious shortcode parameters that attempt to access unauthorized posts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-02T20:44:10.412Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e2db7ef31ef0b59736e

Added to database: 2/25/2026, 9:48:29 PM

Last enriched: 2/26/2026, 6:45:54 AM

Last updated: 2/26/2026, 9:06:45 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats