CVE-2024-12071: CWE-862 Missing Authorization in evergreencontentposter Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media
CVE-2024-12071 is a medium severity vulnerability in the WordPress plugin Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media (all versions up to 1. 4. 4). It stems from a missing authorization check in the delete_network_post() function, allowing unauthenticated attackers to delete arbitrary posts and pages. Exploitation requires no authentication or user interaction, but it does not impact confidentiality or availability. The vulnerability affects the integrity of website content by enabling unauthorized deletion. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying patches once available and restrict plugin usage to trusted administrators. Countries with significant WordPress usage and active social media marketing sectors are at higher risk, including the United States, United Kingdom, Canada, Australia, Germany, and India.
AI Analysis
Technical Summary
CVE-2024-12071 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Evergreen Content Poster WordPress plugin, which automates posting and scheduling content to social media. The flaw exists in the delete_network_post() function, which lacks proper capability checks to verify if the user is authorized to delete posts or pages. This absence of authorization allows unauthenticated attackers to invoke this function and delete arbitrary content on the affected WordPress sites. The vulnerability affects all versions up to and including 1.4.4. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (remote), requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. The scope remains unchanged as the vulnerability affects only the vulnerable plugin component. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability can lead to content loss and potential disruption of website operations, especially for sites relying heavily on scheduled social media content management.
Potential Impact
The primary impact of CVE-2024-12071 is the unauthorized deletion of posts and pages, which compromises the integrity of website content. For organizations, this can result in loss of critical marketing materials, disruption of scheduled social media campaigns, and damage to brand reputation. Although the vulnerability does not affect confidentiality or availability directly, the loss of content can indirectly affect business operations and user trust. Attackers exploiting this flaw could selectively remove important posts, causing confusion or misinformation if content is removed unexpectedly. Organizations relying on this plugin for social media automation are particularly vulnerable, and recovery may require manual restoration of deleted content, leading to operational downtime and increased administrative overhead.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately audit their WordPress installations for the presence of the Evergreen Content Poster plugin and verify the version in use. Until an official patch is released, consider disabling or uninstalling the plugin to prevent exploitation. Restrict plugin management capabilities strictly to trusted administrators and implement web application firewalls (WAFs) with rules to detect and block unauthorized requests targeting the delete_network_post() function. Monitor website logs for suspicious deletion requests originating from unauthenticated sources. Additionally, maintain regular backups of website content to enable rapid restoration in case of unauthorized deletions. Once a patch or update is available from the vendor, apply it promptly. Consider employing security plugins that enforce capability checks and enhance authorization controls for plugin functions.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, India, France, Brazil, Netherlands, Japan
CVE-2024-12071: CWE-862 Missing Authorization in evergreencontentposter Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media
Description
CVE-2024-12071 is a medium severity vulnerability in the WordPress plugin Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media (all versions up to 1. 4. 4). It stems from a missing authorization check in the delete_network_post() function, allowing unauthenticated attackers to delete arbitrary posts and pages. Exploitation requires no authentication or user interaction, but it does not impact confidentiality or availability. The vulnerability affects the integrity of website content by enabling unauthorized deletion. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying patches once available and restrict plugin usage to trusted administrators. Countries with significant WordPress usage and active social media marketing sectors are at higher risk, including the United States, United Kingdom, Canada, Australia, Germany, and India.
AI-Powered Analysis
Technical Analysis
CVE-2024-12071 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Evergreen Content Poster WordPress plugin, which automates posting and scheduling content to social media. The flaw exists in the delete_network_post() function, which lacks proper capability checks to verify if the user is authorized to delete posts or pages. This absence of authorization allows unauthenticated attackers to invoke this function and delete arbitrary content on the affected WordPress sites. The vulnerability affects all versions up to and including 1.4.4. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (remote), requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. The scope remains unchanged as the vulnerability affects only the vulnerable plugin component. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability can lead to content loss and potential disruption of website operations, especially for sites relying heavily on scheduled social media content management.
Potential Impact
The primary impact of CVE-2024-12071 is the unauthorized deletion of posts and pages, which compromises the integrity of website content. For organizations, this can result in loss of critical marketing materials, disruption of scheduled social media campaigns, and damage to brand reputation. Although the vulnerability does not affect confidentiality or availability directly, the loss of content can indirectly affect business operations and user trust. Attackers exploiting this flaw could selectively remove important posts, causing confusion or misinformation if content is removed unexpectedly. Organizations relying on this plugin for social media automation are particularly vulnerable, and recovery may require manual restoration of deleted content, leading to operational downtime and increased administrative overhead.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately audit their WordPress installations for the presence of the Evergreen Content Poster plugin and verify the version in use. Until an official patch is released, consider disabling or uninstalling the plugin to prevent exploitation. Restrict plugin management capabilities strictly to trusted administrators and implement web application firewalls (WAFs) with rules to detect and block unauthorized requests targeting the delete_network_post() function. Monitor website logs for suspicious deletion requests originating from unauthenticated sources. Additionally, maintain regular backups of website content to enable rapid restoration in case of unauthorized deletions. Once a patch or update is available from the vendor, apply it promptly. Consider employing security plugins that enforce capability checks and enhance authorization controls for plugin functions.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-02T21:35:28.211Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e2db7ef31ef0b597380
Added to database: 2/25/2026, 9:48:29 PM
Last enriched: 2/26/2026, 6:45:30 AM
Last updated: 2/26/2026, 9:24:08 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.