Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12171: CWE-862 Missing Authorization in elextensions ELEX WordPress HelpDesk & Customer Ticketing System

0
High
VulnerabilityCVE-2024-12171cvecve-2024-12171cwe-862
Published: Sat Feb 01 2025 (02/01/2025, 03:21:13 UTC)
Source: CVE Database V5
Vendor/Project: elextensions
Product: ELEX WordPress HelpDesk & Customer Ticketing System

Description

CVE-2024-12171 is a high-severity privilege escalation vulnerability in the ELEX WordPress HelpDesk & Customer Ticketing System plugin (up to version 3. 2. 6). The flaw arises from a missing authorization check on the 'eh_crm_agent_add_user' AJAX action, allowing authenticated users with Subscriber-level access or higher to create new administrative accounts without proper permissions. This vulnerability requires no user interaction and can be exploited remotely over the network. Successful exploitation results in full administrative control over the affected WordPress site, compromising confidentiality, integrity, and availability. No public exploits are currently known, but the high CVSS score (8. 8) reflects the critical impact potential. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized privilege escalation and potential site takeover.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:27:06 UTC

Technical Analysis

The vulnerability identified as CVE-2024-12171 affects the ELEX WordPress HelpDesk & Customer Ticketing System plugin, versions up to and including 3.2.6. It is categorized under CWE-862 (Missing Authorization) and involves a missing capability check on the AJAX action 'eh_crm_agent_add_user'. This action is intended to allow authorized users to add new users, but due to the lack of proper authorization verification, any authenticated user with at least Subscriber-level privileges can invoke this action to create new administrative accounts. Since WordPress Subscriber roles are typically assigned to minimally privileged users, this flaw effectively allows privilege escalation from low-level user to full administrator. The vulnerability is exploitable remotely over the network without user interaction, making it highly accessible to attackers who can authenticate to the site. The CVSS 3.1 base score of 8.8 reflects the ease of exploitation (low attack complexity), the requirement of low privileges (PR:L), and the severe impact on confidentiality, integrity, and availability (all rated high). No patches or official fixes were linked at the time of publication, and no known exploits in the wild have been reported, though the risk remains significant given the potential for complete site compromise. The vulnerability affects all versions of the plugin up to 3.2.6, which is widely used in WordPress environments for helpdesk and ticketing functions.

Potential Impact

The impact of CVE-2024-12171 is severe for organizations using the vulnerable ELEX WordPress HelpDesk & Customer Ticketing System plugin. An attacker who can authenticate with minimal privileges (Subscriber or higher) can escalate their privileges to administrator, gaining full control over the WordPress site. This allows them to modify or delete content, install malicious plugins or backdoors, exfiltrate sensitive data, disrupt services, or use the compromised site as a launchpad for further attacks. The compromise of administrative credentials undermines the confidentiality, integrity, and availability of the affected systems. Organizations relying on this plugin for customer support or ticketing may face operational disruption, data breaches, reputational damage, and regulatory compliance issues. Because WordPress powers a significant portion of websites globally, including many business-critical sites, the vulnerability poses a broad risk. Attackers do not require user interaction beyond authentication, increasing the likelihood of exploitation if credentials are leaked or weak authentication mechanisms are in place.

Mitigation Recommendations

To mitigate CVE-2024-12171, organizations should immediately upgrade the ELEX WordPress HelpDesk & Customer Ticketing System plugin to a version where this vulnerability is patched once available. In the absence of an official patch, administrators should implement the following specific measures: 1) Restrict user registrations and minimize the assignment of Subscriber or higher roles to untrusted users. 2) Employ strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3) Use Web Application Firewalls (WAFs) to detect and block suspicious AJAX requests targeting 'eh_crm_agent_add_user'. 4) Audit existing user accounts for unauthorized administrative users and remove any suspicious accounts. 5) Temporarily disable or restrict access to the vulnerable AJAX action by customizing plugin code or using security plugins that can block specific AJAX endpoints. 6) Monitor logs for unusual privilege escalation attempts or account creation activities. 7) Educate site administrators and users about the risk and encourage prompt reporting of suspicious behavior. These targeted mitigations help reduce the attack surface and limit exploitation opportunities until an official patch is deployed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-04T15:08:43.572Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e30b7ef31ef0b597787

Added to database: 2/25/2026, 9:48:32 PM

Last enriched: 2/26/2026, 4:27:06 AM

Last updated: 2/26/2026, 8:00:24 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats