CVE-2024-12113: CWE-862 Missing Authorization in youzify Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress
CVE-2024-12113 is a medium severity vulnerability in the Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress. It arises from missing authorization checks in the delete_user_review() and delete_review() functions, allowing authenticated users with Subscriber-level access or higher to delete reviews created by other users. The vulnerability affects all versions up to and including 1. 3. 2. Exploitation does not require user interaction and can be performed remotely over the network. Although it does not impact confidentiality or availability, it results in unauthorized modification of data (integrity loss). No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or applying mitigation controls to prevent abuse. The threat primarily targets WordPress sites using this plugin, which are common globally but especially prevalent in countries with large WordPress user bases.
AI Analysis
Technical Summary
The vulnerability CVE-2024-12113 affects the Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress, specifically versions up to 1.3.2. The root cause is a missing authorization check (CWE-862) in the delete_user_review() and delete_review() functions. These functions allow authenticated users with Subscriber-level privileges or higher to delete reviews submitted by other users without proper capability verification. This flaw enables unauthorized modification of user-generated content, undermining data integrity within the affected WordPress sites. The vulnerability can be exploited remotely without user interaction, as it only requires the attacker to be authenticated with minimal privileges. The CVSS v3.1 base score is 4.3, indicating a medium severity, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, meaning network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, no confidentiality or availability impact, but integrity is compromised. No public exploits or active exploitation in the wild have been reported to date. The vulnerability affects all plugin versions up to 1.3.2, and no official patch links were provided at the time of reporting. The issue is significant for websites relying on Youzify for social networking and community features, as it could allow malicious users to disrupt community content by deleting reviews arbitrarily.
Potential Impact
The primary impact of this vulnerability is unauthorized modification of data integrity, specifically the deletion of user reviews by unauthorized authenticated users. This can lead to loss of user-generated content, damage to community trust, and potential reputational harm for organizations running affected WordPress sites. While confidentiality and availability are not directly impacted, the integrity breach can affect user experience and content reliability. Attackers with Subscriber-level access can exploit this flaw, which lowers the bar for exploitation since such access is commonly granted to registered users on many WordPress sites. The scope is limited to sites using the Youzify plugin, but given WordPress's widespread use globally, the potential reach is significant. Organizations hosting online communities or social networks using this plugin may face content manipulation risks, which could be leveraged for further social engineering or trust exploitation. No known active exploitation reduces immediate risk, but the vulnerability remains a concern until remediated.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first check for and apply any available updates or patches from the Youzify plugin vendor as soon as they are released. In the absence of an official patch, administrators should consider temporarily disabling the review deletion functionality or restricting it to trusted roles only by customizing capability checks in the plugin code. Implementing strict role-based access controls (RBAC) to limit Subscriber-level users' permissions can reduce the attack surface. Monitoring and logging review deletion activities can help detect suspicious behavior early. Additionally, site owners should educate users about the risk and encourage reporting of unexpected content deletions. Employing a web application firewall (WAF) with custom rules to detect and block unauthorized deletion requests may provide interim protection. Regular backups of site content are essential to recover any lost data caused by exploitation. Finally, security teams should stay alert for any emerging exploit reports and update defenses accordingly.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands
CVE-2024-12113: CWE-862 Missing Authorization in youzify Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress
Description
CVE-2024-12113 is a medium severity vulnerability in the Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress. It arises from missing authorization checks in the delete_user_review() and delete_review() functions, allowing authenticated users with Subscriber-level access or higher to delete reviews created by other users. The vulnerability affects all versions up to and including 1. 3. 2. Exploitation does not require user interaction and can be performed remotely over the network. Although it does not impact confidentiality or availability, it results in unauthorized modification of data (integrity loss). No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or applying mitigation controls to prevent abuse. The threat primarily targets WordPress sites using this plugin, which are common globally but especially prevalent in countries with large WordPress user bases.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2024-12113 affects the Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress, specifically versions up to 1.3.2. The root cause is a missing authorization check (CWE-862) in the delete_user_review() and delete_review() functions. These functions allow authenticated users with Subscriber-level privileges or higher to delete reviews submitted by other users without proper capability verification. This flaw enables unauthorized modification of user-generated content, undermining data integrity within the affected WordPress sites. The vulnerability can be exploited remotely without user interaction, as it only requires the attacker to be authenticated with minimal privileges. The CVSS v3.1 base score is 4.3, indicating a medium severity, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, meaning network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, no confidentiality or availability impact, but integrity is compromised. No public exploits or active exploitation in the wild have been reported to date. The vulnerability affects all plugin versions up to 1.3.2, and no official patch links were provided at the time of reporting. The issue is significant for websites relying on Youzify for social networking and community features, as it could allow malicious users to disrupt community content by deleting reviews arbitrarily.
Potential Impact
The primary impact of this vulnerability is unauthorized modification of data integrity, specifically the deletion of user reviews by unauthorized authenticated users. This can lead to loss of user-generated content, damage to community trust, and potential reputational harm for organizations running affected WordPress sites. While confidentiality and availability are not directly impacted, the integrity breach can affect user experience and content reliability. Attackers with Subscriber-level access can exploit this flaw, which lowers the bar for exploitation since such access is commonly granted to registered users on many WordPress sites. The scope is limited to sites using the Youzify plugin, but given WordPress's widespread use globally, the potential reach is significant. Organizations hosting online communities or social networks using this plugin may face content manipulation risks, which could be leveraged for further social engineering or trust exploitation. No known active exploitation reduces immediate risk, but the vulnerability remains a concern until remediated.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first check for and apply any available updates or patches from the Youzify plugin vendor as soon as they are released. In the absence of an official patch, administrators should consider temporarily disabling the review deletion functionality or restricting it to trusted roles only by customizing capability checks in the plugin code. Implementing strict role-based access controls (RBAC) to limit Subscriber-level users' permissions can reduce the attack surface. Monitoring and logging review deletion activities can help detect suspicious behavior early. Additionally, site owners should educate users about the risk and encourage reporting of unexpected content deletions. Employing a web application firewall (WAF) with custom rules to detect and block unauthorized deletion requests may provide interim protection. Regular backups of site content are essential to recover any lost data caused by exploitation. Finally, security teams should stay alert for any emerging exploit reports and update defenses accordingly.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-03T20:34:44.734Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e2db7ef31ef0b5974fe
Added to database: 2/25/2026, 9:48:29 PM
Last enriched: 2/26/2026, 6:32:20 AM
Last updated: 2/26/2026, 6:46:50 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.