Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12295: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in PX-lab BoomBox Theme Extensions

0
High
VulnerabilityCVE-2024-12295cvecve-2024-12295cwe-640
Published: Wed Mar 19 2025 (03/19/2025, 04:21:06 UTC)
Source: CVE Database V5
Vendor/Project: PX-lab
Product: BoomBox Theme Extensions

Description

CVE-2024-12295 is a high-severity vulnerability in the BoomBox Theme Extensions plugin for WordPress that allows privilege escalation via account takeover. The flaw exists because the plugin fails to properly validate user identity before allowing password resets through the 'boombox_ajax_reset_password' function. Authenticated users with subscriber-level privileges or higher can exploit this to change any user's password, including administrators, thereby gaining unauthorized access. This vulnerability affects all versions up to and including 1. 8. 0. Exploitation requires no user interaction beyond authentication at a low privilege level. The CVSS score is 8. 8, reflecting high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:10:45 UTC

Technical Analysis

CVE-2024-12295 is a critical vulnerability identified in the BoomBox Theme Extensions plugin for WordPress, affecting all versions up to 1.8.0. The root cause is a weak password recovery mechanism categorized under CWE-640, where the plugin does not adequately verify the identity of users requesting password resets via the 'boombox_ajax_reset_password' AJAX function. This improper validation allows any authenticated user with subscriber-level privileges or higher to reset the passwords of arbitrary users, including those with administrative privileges. Consequently, an attacker can escalate privileges by taking over administrator accounts, leading to full control over the affected WordPress site. The vulnerability is remotely exploitable over the network without user interaction, requiring only low-level authenticated access. The CVSS v3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, as attackers can gain unauthorized access, modify critical data, and disrupt service. Although no public exploits have been reported yet, the ease of exploitation and the widespread use of WordPress and its themes make this a significant threat. The vulnerability was published on March 19, 2025, and is tracked by Wordfence and the CVE database. No official patches have been linked yet, emphasizing the need for immediate attention from site administrators.

Potential Impact

The impact of CVE-2024-12295 is substantial for organizations using the BoomBox Theme Extensions plugin on WordPress sites. Successful exploitation allows attackers with minimal privileges to escalate to administrator-level access by resetting arbitrary user passwords. This can lead to full site compromise, including unauthorized data access, content manipulation, deployment of malicious code, and disruption of services. For businesses relying on WordPress for e-commerce, content management, or customer engagement, such a breach could result in data breaches, reputational damage, financial loss, and regulatory penalties. The vulnerability's network accessibility and lack of user interaction requirements increase the risk of automated or targeted attacks. Additionally, compromised administrative accounts can be used to pivot to other internal systems or launch further attacks, amplifying the threat's scope. Given WordPress's global popularity, the potential impact spans small blogs to large enterprise websites, making timely mitigation critical.

Mitigation Recommendations

To mitigate CVE-2024-12295, organizations should immediately verify if they are using the BoomBox Theme Extensions plugin version 1.8.0 or earlier and plan for an upgrade once a patched version is released. Until then, consider disabling the plugin or restricting access to the password reset functionality via web application firewalls or custom access controls. Implement strict monitoring and alerting for suspicious password reset activities, especially those initiated by low-privilege users. Enforce strong authentication policies, including multi-factor authentication (MFA) for administrator accounts, to reduce the risk of account takeover. Review and audit user privileges regularly to limit subscriber-level accounts and remove unnecessary users. Additionally, consider applying custom code patches or filters to validate user identity more robustly before password resets if feasible. Maintain regular backups and have an incident response plan ready to address potential compromises. Stay informed through vendor advisories and security communities for updates and patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-06T00:06:04.720Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e35b7ef31ef0b597ccd

Added to database: 2/25/2026, 9:48:37 PM

Last enriched: 2/26/2026, 4:10:45 AM

Last updated: 2/26/2026, 4:54:07 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats