Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12071: CWE-862 Missing Authorization in evergreencontentposter Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media

0
Medium
VulnerabilityCVE-2024-12071cvecve-2024-12071cwe-862
Published: Sat Jan 18 2025 (01/18/2025, 03:21:12 UTC)
Source: CVE Database V5
Vendor/Project: evergreencontentposter
Product: Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media

Description

CVE-2024-12071 is a medium severity vulnerability in the WordPress plugin Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media (all versions up to 1. 4. 4). It stems from a missing authorization check in the delete_network_post() function, allowing unauthenticated attackers to delete arbitrary posts and pages. Exploitation requires no authentication or user interaction, but it does not impact confidentiality or availability. The vulnerability affects the integrity of website content by enabling unauthorized deletion. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying patches once available and restrict plugin usage to trusted administrators. Countries with significant WordPress usage and active social media marketing sectors are at higher risk, including the United States, United Kingdom, Canada, Australia, Germany, and India.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:45:30 UTC

Technical Analysis

CVE-2024-12071 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Evergreen Content Poster WordPress plugin, which automates posting and scheduling content to social media. The flaw exists in the delete_network_post() function, which lacks proper capability checks to verify if the user is authorized to delete posts or pages. This absence of authorization allows unauthenticated attackers to invoke this function and delete arbitrary content on the affected WordPress sites. The vulnerability affects all versions up to and including 1.4.4. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (remote), requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. The scope remains unchanged as the vulnerability affects only the vulnerable plugin component. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability can lead to content loss and potential disruption of website operations, especially for sites relying heavily on scheduled social media content management.

Potential Impact

The primary impact of CVE-2024-12071 is the unauthorized deletion of posts and pages, which compromises the integrity of website content. For organizations, this can result in loss of critical marketing materials, disruption of scheduled social media campaigns, and damage to brand reputation. Although the vulnerability does not affect confidentiality or availability directly, the loss of content can indirectly affect business operations and user trust. Attackers exploiting this flaw could selectively remove important posts, causing confusion or misinformation if content is removed unexpectedly. Organizations relying on this plugin for social media automation are particularly vulnerable, and recovery may require manual restoration of deleted content, leading to operational downtime and increased administrative overhead.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their WordPress installations for the presence of the Evergreen Content Poster plugin and verify the version in use. Until an official patch is released, consider disabling or uninstalling the plugin to prevent exploitation. Restrict plugin management capabilities strictly to trusted administrators and implement web application firewalls (WAFs) with rules to detect and block unauthorized requests targeting the delete_network_post() function. Monitor website logs for suspicious deletion requests originating from unauthenticated sources. Additionally, maintain regular backups of website content to enable rapid restoration in case of unauthorized deletions. Once a patch or update is available from the vendor, apply it promptly. Consider employing security plugins that enforce capability checks and enhance authorization controls for plugin functions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-02T21:35:28.211Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e2db7ef31ef0b597380

Added to database: 2/25/2026, 9:48:29 PM

Last enriched: 2/26/2026, 6:45:30 AM

Last updated: 2/26/2026, 9:24:08 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats