Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12102: CWE-639 Authorization Bypass Through User-Controlled Key in seventhqueen Typer Core

0
Medium
VulnerabilityCVE-2024-12102cvecve-2024-12102cwe-639
Published: Thu Jan 30 2025 (01/30/2025, 13:42:09 UTC)
Source: CVE Database V5
Vendor/Project: seventhqueen
Product: Typer Core

Description

CVE-2024-12102 is a medium-severity vulnerability in the Typer Core WordPress plugin (all versions up to 1. 9. 6) that allows authenticated users with Contributor-level access or higher to bypass authorization controls. The flaw arises from insufficient restrictions on the 'elementor-template' shortcode, enabling attackers to access private or draft Elementor posts they should not see. This information exposure does not require user interaction and can be exploited remotely over the network. Although the impact is limited to confidentiality and does not affect integrity or availability, it can lead to unauthorized data disclosure within affected WordPress sites. No known exploits are currently in the wild, and no patches have been published yet. Organizations using this plugin should prioritize access control reviews and consider restricting Contributor-level permissions until a fix is available.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:43:21 UTC

Technical Analysis

The vulnerability identified as CVE-2024-12102 affects the Typer Core plugin for WordPress, specifically versions up to and including 1.9.6. It is classified under CWE-639, which involves authorization bypass through user-controlled keys. The issue stems from the 'elementor-template' shortcode functionality, which lacks sufficient restrictions on which posts can be included or rendered. Authenticated users with Contributor-level permissions or higher can exploit this flaw to retrieve content from private or draft posts created with Elementor, bypassing intended access controls. The vulnerability is remotely exploitable without user interaction, requiring only authenticated access with relatively low privileges. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the limited impact on confidentiality only, with no integrity or availability impact. No patches or known exploits have been reported at the time of publication, but the exposure of sensitive unpublished content could have privacy and operational implications for affected sites. The vulnerability highlights the importance of strict access control enforcement in WordPress plugins that interact with post content and templates.

Potential Impact

The primary impact of CVE-2024-12102 is unauthorized disclosure of private or draft post content within WordPress sites using the Typer Core plugin. This can lead to leakage of sensitive or confidential information that was not intended for users with Contributor-level access. While the vulnerability does not affect data integrity or site availability, the exposure of unpublished or restricted content could damage organizational confidentiality, intellectual property, or user privacy. For organizations relying on WordPress for content management, especially those using Elementor and Typer Core together, this could undermine trust and compliance with data protection policies. The ease of exploitation by relatively low-privileged authenticated users increases the risk, particularly in environments with multiple contributors or less stringent user management. Although no active exploitation is known, the vulnerability could be leveraged in targeted attacks or insider threat scenarios to gather sensitive information.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict Contributor-level user permissions by reviewing and limiting who can be assigned this role, ensuring only trusted users have such access. 2) Temporarily disable or remove the Typer Core plugin if feasible, especially on sites with sensitive unpublished content. 3) Audit and monitor usage of the 'elementor-template' shortcode to detect unusual access patterns or attempts to retrieve unauthorized posts. 4) Implement additional access control mechanisms at the WordPress or server level to restrict access to draft and private posts beyond plugin controls. 5) Keep WordPress core, Elementor, and all plugins up to date and subscribe to security advisories from the plugin vendor and WordPress security teams. 6) Educate content managers and contributors about the risks of unauthorized data exposure and enforce strict user role management policies. These steps will help reduce the attack surface and limit potential data leakage until a vendor patch is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-03T15:13:42.629Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e2db7ef31ef0b5974c9

Added to database: 2/25/2026, 9:48:29 PM

Last enriched: 2/26/2026, 6:43:21 AM

Last updated: 2/26/2026, 7:48:59 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats