CVE-2024-12164: CWE-862 Missing Authorization in creativewerkdesigns WPSyncSheets Lite For WPForms – WPForms Google Spreadsheet Addon
CVE-2024-12164 is a medium severity vulnerability in the WPSyncSheets Lite For WPForms – WPForms Google Spreadsheet Addon WordPress plugin. It arises from a missing authorization check in the wpsslwp_reset_settings() function, allowing authenticated users with Subscriber-level access or higher to reset plugin settings without proper permissions. This flaw does not require user interaction and can be exploited remotely over the network. While it does not impact confidentiality or availability, it allows unauthorized modification of plugin settings, potentially disrupting functionality or enabling further attacks. No known exploits are currently reported in the wild. Organizations using this plugin should apply patches or implement access restrictions promptly. The vulnerability primarily affects WordPress sites using this plugin, which are prevalent in countries with high WordPress adoption. The CVSS score is 4. 3, reflecting a medium risk due to limited impact and required authentication. Defenders should audit user roles, restrict plugin management capabilities, and monitor for suspicious configuration changes.
AI Analysis
Technical Summary
CVE-2024-12164 identifies a missing authorization vulnerability (CWE-862) in the WPSyncSheets Lite For WPForms – WPForms Google Spreadsheet Addon plugin for WordPress, affecting all versions up to and including 1.6. The vulnerability stems from the wpsslwp_reset_settings() function lacking a proper capability check, which means that any authenticated user with at least Subscriber-level privileges can invoke this function to reset the plugin's settings without appropriate permissions. This unauthorized modification can disrupt the plugin's intended operation, potentially leading to misconfigurations or enabling further exploitation vectors if attackers manipulate settings to weaken security controls. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require the attacker to have an authenticated account on the WordPress site. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but acknowledging the integrity impact due to unauthorized changes. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The vulnerability affects a niche plugin used to synchronize WPForms data with Google Spreadsheets, which is popular among WordPress users who integrate form data with spreadsheets for automation or reporting purposes.
Potential Impact
The primary impact of this vulnerability is unauthorized modification of plugin settings, which can lead to disruption of data synchronization between WPForms and Google Spreadsheets. Although it does not directly expose sensitive data or cause denial of service, attackers with low-level authenticated access can alter configurations, potentially disabling logging, changing data export parameters, or corrupting integration workflows. This can degrade business processes relying on accurate form data collection and reporting. Additionally, altered settings could be leveraged as a foothold for further attacks if attackers manipulate plugin behavior to escalate privileges or inject malicious payloads. Organizations relying on this plugin for critical data workflows may experience operational interruptions or data integrity issues. Since the vulnerability requires authenticated access, the risk is higher in environments with weak user management or where subscriber accounts are easily compromised or created.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the WPSyncSheets Lite For WPForms plugin to a patched version once available from the vendor. Until a patch is released, restrict user roles and permissions to limit Subscriber-level access to trusted users only. Implement strict user account management policies, including multi-factor authentication and regular review of user privileges. Monitor WordPress logs for unusual activity related to plugin settings changes or reset functions. Consider disabling or uninstalling the plugin if it is not essential to reduce attack surface. Additionally, use WordPress security plugins that can enforce capability checks or block unauthorized REST API calls targeting plugin functions. Regular backups of plugin settings and form data should be maintained to enable quick recovery from unauthorized modifications. Finally, educate site administrators about the risks of granting unnecessary access to low-privilege users.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2024-12164: CWE-862 Missing Authorization in creativewerkdesigns WPSyncSheets Lite For WPForms – WPForms Google Spreadsheet Addon
Description
CVE-2024-12164 is a medium severity vulnerability in the WPSyncSheets Lite For WPForms – WPForms Google Spreadsheet Addon WordPress plugin. It arises from a missing authorization check in the wpsslwp_reset_settings() function, allowing authenticated users with Subscriber-level access or higher to reset plugin settings without proper permissions. This flaw does not require user interaction and can be exploited remotely over the network. While it does not impact confidentiality or availability, it allows unauthorized modification of plugin settings, potentially disrupting functionality or enabling further attacks. No known exploits are currently reported in the wild. Organizations using this plugin should apply patches or implement access restrictions promptly. The vulnerability primarily affects WordPress sites using this plugin, which are prevalent in countries with high WordPress adoption. The CVSS score is 4. 3, reflecting a medium risk due to limited impact and required authentication. Defenders should audit user roles, restrict plugin management capabilities, and monitor for suspicious configuration changes.
AI-Powered Analysis
Technical Analysis
CVE-2024-12164 identifies a missing authorization vulnerability (CWE-862) in the WPSyncSheets Lite For WPForms – WPForms Google Spreadsheet Addon plugin for WordPress, affecting all versions up to and including 1.6. The vulnerability stems from the wpsslwp_reset_settings() function lacking a proper capability check, which means that any authenticated user with at least Subscriber-level privileges can invoke this function to reset the plugin's settings without appropriate permissions. This unauthorized modification can disrupt the plugin's intended operation, potentially leading to misconfigurations or enabling further exploitation vectors if attackers manipulate settings to weaken security controls. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require the attacker to have an authenticated account on the WordPress site. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but acknowledging the integrity impact due to unauthorized changes. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The vulnerability affects a niche plugin used to synchronize WPForms data with Google Spreadsheets, which is popular among WordPress users who integrate form data with spreadsheets for automation or reporting purposes.
Potential Impact
The primary impact of this vulnerability is unauthorized modification of plugin settings, which can lead to disruption of data synchronization between WPForms and Google Spreadsheets. Although it does not directly expose sensitive data or cause denial of service, attackers with low-level authenticated access can alter configurations, potentially disabling logging, changing data export parameters, or corrupting integration workflows. This can degrade business processes relying on accurate form data collection and reporting. Additionally, altered settings could be leveraged as a foothold for further attacks if attackers manipulate plugin behavior to escalate privileges or inject malicious payloads. Organizations relying on this plugin for critical data workflows may experience operational interruptions or data integrity issues. Since the vulnerability requires authenticated access, the risk is higher in environments with weak user management or where subscriber accounts are easily compromised or created.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the WPSyncSheets Lite For WPForms plugin to a patched version once available from the vendor. Until a patch is released, restrict user roles and permissions to limit Subscriber-level access to trusted users only. Implement strict user account management policies, including multi-factor authentication and regular review of user privileges. Monitor WordPress logs for unusual activity related to plugin settings changes or reset functions. Consider disabling or uninstalling the plugin if it is not essential to reduce attack surface. Additionally, use WordPress security plugins that can enforce capability checks or block unauthorized REST API calls targeting plugin functions. Regular backups of plugin settings and form data should be maintained to enable quick recovery from unauthorized modifications. Finally, educate site administrators about the risks of granting unnecessary access to low-privilege users.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-04T14:41:18.256Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e30b7ef31ef0b5976ac
Added to database: 2/25/2026, 9:48:32 PM
Last enriched: 2/26/2026, 6:15:30 AM
Last updated: 2/26/2026, 7:25:04 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.