CVE-2024-12204: CWE-862 Missing Authorization in galdub Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups
CVE-2024-12204 is a medium severity vulnerability in the WordPress plugin 'Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups' by galdub. The flaw arises from missing authorization checks in the class-cx-rest. php file, allowing authenticated users with Subscriber-level access or higher to perform unauthorized actions. These actions include creating 100% off coupons, deleting posts and leads, and updating coupon statuses. Exploitation does not require user interaction but does require at least low-level authenticated access. The vulnerability affects all versions up to and including 1. 3. 5. While no known exploits are reported in the wild, the vulnerability poses risks to e-commerce sites using this plugin. The CVSS score is 5.
AI Analysis
Technical Summary
CVE-2024-12204 is a missing authorization vulnerability (CWE-862) found in the WordPress plugin 'Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups' developed by galdub. The vulnerability exists in the class-cx-rest.php file, where several functions lack proper capability checks, allowing authenticated users with minimal privileges (Subscriber role or higher) to perform unauthorized operations. These operations include creating coupons with 100% discounts, deleting posts and leads, and modifying coupon statuses. The absence of authorization checks means that the plugin's REST API endpoints do not verify whether the requesting user has the appropriate permissions before executing sensitive actions. This can lead to privilege escalation within the WordPress environment, enabling attackers to manipulate e-commerce promotions, disrupt content, and interfere with lead management. The vulnerability affects all plugin versions up to 1.3.5. The CVSS 3.1 base score is 5.4 (medium), with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and impacts on confidentiality and integrity but not availability. No patches or exploits are currently publicly known, but the risk remains significant for sites using this plugin without mitigation.
Potential Impact
The vulnerability allows low-privilege authenticated users (Subscribers or higher) to escalate their privileges by creating free coupons, deleting content, and altering coupon statuses. This can lead to financial losses through unauthorized discounts, reputational damage from content deletion, and disruption of marketing and sales operations. Attackers could exploit this to undermine the integrity of promotional campaigns, cause customer confusion, and potentially facilitate further attacks by manipulating site content or leads. Organizations relying on WooCommerce and this plugin for e-commerce functionality are particularly at risk. The impact is primarily on confidentiality and integrity of business-critical data and operations, with no direct availability impact. The ease of exploitation by authenticated users makes it a moderate risk, especially in environments with many low-privilege users or where account creation is not tightly controlled.
Mitigation Recommendations
1. Immediately update the Coupon X plugin to a patched version once available from the vendor. 2. Until a patch is released, restrict user roles that can authenticate on the WordPress site, especially limiting Subscriber-level accounts or enforcing stricter user registration policies. 3. Implement Web Application Firewall (WAF) rules to monitor and block suspicious REST API calls targeting the vulnerable endpoints. 4. Review and harden WordPress user role permissions to minimize unnecessary privileges. 5. Monitor logs for unusual coupon creation or deletion activities. 6. Consider disabling or removing the plugin if it is not essential to reduce attack surface. 7. Conduct regular security audits of plugins and their REST API endpoints to detect missing authorization checks. 8. Educate site administrators on the risks of low-privilege user accounts and enforce strong authentication controls.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-12204: CWE-862 Missing Authorization in galdub Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups
Description
CVE-2024-12204 is a medium severity vulnerability in the WordPress plugin 'Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups' by galdub. The flaw arises from missing authorization checks in the class-cx-rest. php file, allowing authenticated users with Subscriber-level access or higher to perform unauthorized actions. These actions include creating 100% off coupons, deleting posts and leads, and updating coupon statuses. Exploitation does not require user interaction but does require at least low-level authenticated access. The vulnerability affects all versions up to and including 1. 3. 5. While no known exploits are reported in the wild, the vulnerability poses risks to e-commerce sites using this plugin. The CVSS score is 5.
AI-Powered Analysis
Technical Analysis
CVE-2024-12204 is a missing authorization vulnerability (CWE-862) found in the WordPress plugin 'Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups' developed by galdub. The vulnerability exists in the class-cx-rest.php file, where several functions lack proper capability checks, allowing authenticated users with minimal privileges (Subscriber role or higher) to perform unauthorized operations. These operations include creating coupons with 100% discounts, deleting posts and leads, and modifying coupon statuses. The absence of authorization checks means that the plugin's REST API endpoints do not verify whether the requesting user has the appropriate permissions before executing sensitive actions. This can lead to privilege escalation within the WordPress environment, enabling attackers to manipulate e-commerce promotions, disrupt content, and interfere with lead management. The vulnerability affects all plugin versions up to 1.3.5. The CVSS 3.1 base score is 5.4 (medium), with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and impacts on confidentiality and integrity but not availability. No patches or exploits are currently publicly known, but the risk remains significant for sites using this plugin without mitigation.
Potential Impact
The vulnerability allows low-privilege authenticated users (Subscribers or higher) to escalate their privileges by creating free coupons, deleting content, and altering coupon statuses. This can lead to financial losses through unauthorized discounts, reputational damage from content deletion, and disruption of marketing and sales operations. Attackers could exploit this to undermine the integrity of promotional campaigns, cause customer confusion, and potentially facilitate further attacks by manipulating site content or leads. Organizations relying on WooCommerce and this plugin for e-commerce functionality are particularly at risk. The impact is primarily on confidentiality and integrity of business-critical data and operations, with no direct availability impact. The ease of exploitation by authenticated users makes it a moderate risk, especially in environments with many low-privilege users or where account creation is not tightly controlled.
Mitigation Recommendations
1. Immediately update the Coupon X plugin to a patched version once available from the vendor. 2. Until a patch is released, restrict user roles that can authenticate on the WordPress site, especially limiting Subscriber-level accounts or enforcing stricter user registration policies. 3. Implement Web Application Firewall (WAF) rules to monitor and block suspicious REST API calls targeting the vulnerable endpoints. 4. Review and harden WordPress user role permissions to minimize unnecessary privileges. 5. Monitor logs for unusual coupon creation or deletion activities. 6. Consider disabling or removing the plugin if it is not essential to reduce attack surface. 7. Conduct regular security audits of plugins and their REST API endpoints to detect missing authorization checks. 8. Educate site administrators on the risks of low-privilege user accounts and enforce strong authentication controls.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-04T17:27:45.798Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e31b7ef31ef0b597844
Added to database: 2/25/2026, 9:48:33 PM
Last enriched: 2/26/2026, 6:02:20 AM
Last updated: 2/26/2026, 6:18:48 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.