Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12099: CWE-639 Authorization Bypass Through User-Controlled Key in getdollie Dollie Hub – Build Your Own WordPress Cloud Platform

0
Medium
VulnerabilityCVE-2024-12099cvecve-2024-12099cwe-639
Published: Wed Dec 04 2024 (12/04/2024, 03:37:41 UTC)
Source: CVE Database V5
Vendor/Project: getdollie
Product: Dollie Hub – Build Your Own WordPress Cloud Platform

Description

CVE-2024-12099 is an authorization bypass vulnerability in the Dollie Hub WordPress plugin, allowing authenticated users with Contributor-level access or higher to access data from password-protected, private, or draft posts they should not see. The flaw arises from insufficient restrictions on the 'elementor-template' shortcode, enabling unauthorized information exposure. The vulnerability affects all versions up to and including 6. 2. 0. Exploitation requires authentication but no user interaction beyond that. The CVSS score is 4. 3 (medium severity), indicating limited confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying access control workarounds to prevent unauthorized data disclosure.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:43:47 UTC

Technical Analysis

CVE-2024-12099 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Dollie Hub – Build Your Own WordPress Cloud Platform plugin. The vulnerability exists in all versions up to 6.2.0 and is triggered via the 'elementor-template' shortcode. This shortcode does not sufficiently restrict which posts can be included, allowing authenticated users with Contributor-level privileges or higher to retrieve content from posts that are password protected, private, or in draft status. Normally, such posts should be inaccessible to Contributors or lower roles, but due to improper authorization checks, these users can bypass intended access controls and extract sensitive or unpublished content. The vulnerability requires authentication but no additional user interaction, and it can be exploited remotely over the network. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) reflects that the attack can be performed remotely with low complexity, requires privileges, and impacts confidentiality only, without affecting integrity or availability. No patches or official fixes were listed at the time of publication, and no known exploits have been reported in the wild. The flaw poses a risk primarily to organizations that use Dollie Hub for WordPress cloud platform management, especially those with multiple contributors and sensitive unpublished content.

Potential Impact

The primary impact of CVE-2024-12099 is unauthorized information disclosure. Contributors or higher privileged users can access content that should be restricted, including password-protected, private, or draft posts. This can lead to leakage of sensitive or confidential information before it is ready for publication, potentially causing reputational damage, violation of privacy policies, or exposure of intellectual property. Since the vulnerability does not affect data integrity or availability, it is less likely to cause system disruption or data manipulation. However, the exposure of unpublished or restricted content can undermine trust in content management workflows and may aid attackers in reconnaissance or social engineering attacks. Organizations relying on Dollie Hub with multiple content contributors are at risk, especially those handling sensitive or regulated information. The medium CVSS score reflects the limited scope of impact but acknowledges the risk of confidentiality breaches. The absence of known exploits suggests limited active exploitation currently, but the vulnerability should be addressed promptly to prevent future abuse.

Mitigation Recommendations

To mitigate CVE-2024-12099, organizations should first check for and apply any official patches or updates released by the Dollie Hub plugin developers once available. In the absence of patches, administrators should restrict Contributor-level access or higher to only trusted users and review user roles to minimize unnecessary privileges. Implementing additional access control mechanisms at the WordPress level, such as custom filters or hooks to enforce post visibility restrictions on shortcodes, can help prevent unauthorized data exposure. Monitoring logs for unusual access patterns to private or draft posts via the 'elementor-template' shortcode is recommended. Disabling or removing the vulnerable shortcode temporarily can be a stopgap measure if patching is delayed. Regular security audits of plugins and user permissions, combined with strict content publishing workflows, will reduce the risk. Additionally, educating contributors about the sensitivity of unpublished content and enforcing strong authentication policies will help mitigate exploitation risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-03T14:52:15.527Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e2db7ef31ef0b5973a1

Added to database: 2/25/2026, 9:48:29 PM

Last enriched: 2/26/2026, 6:43:47 AM

Last updated: 2/26/2026, 7:12:23 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats