CVE-2024-12300: CWE-862 Missing Authorization in webandprint AR for WordPress
CVE-2024-12300 is a low-severity vulnerability in the AR for WordPress plugin caused by missing authorization checks in the set_ar_featured_image() function. This flaw allows unauthenticated attackers to upload files with double extensions, potentially enabling PHP file uploads. However, the uploaded files are deleted immediately, and the attack only works on select server configurations, making exploitation unlikely. The vulnerability affects all versions up to 7. 3 of the plugin. No known exploits are currently in the wild. The CVSS score is 3. 7, reflecting low impact and high attack complexity. Organizations using this plugin should monitor for updates and consider restricting file upload capabilities and server configurations to mitigate risk.
AI Analysis
Technical Summary
CVE-2024-12300 is a vulnerability identified in the AR for WordPress plugin, which is widely used to enhance WordPress functionality related to web and print features. The root cause is a missing authorization check (CWE-862) in the set_ar_featured_image() function, which fails to verify user capabilities before allowing file uploads. This omission enables unauthenticated attackers to perform a double extension file upload attack, where a file is named with two extensions (e.g., file.php.jpg) to bypass file type restrictions and upload executable PHP code. However, the plugin immediately deletes the uploaded file, and the attack only succeeds on certain server configurations that do not properly handle double extensions or file deletion timing. The vulnerability affects all versions up to and including 7.3. Despite the potential for unauthorized file uploads, the immediate deletion and limited server conditions reduce the likelihood of successful exploitation. The CVSS v3.1 score of 3.7 reflects a low-severity rating due to the lack of confidentiality impact, limited integrity impact, no availability impact, and the high complexity of attack. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability was publicly disclosed on December 13, 2024.
Potential Impact
If exploited, this vulnerability could allow an attacker to upload malicious PHP files to a WordPress site running the affected AR for WordPress plugin versions. Although the files are deleted immediately, on certain server configurations, the double extension technique might bypass security controls, potentially enabling remote code execution or unauthorized actions. This could lead to integrity compromise of the website, unauthorized content modification, or further exploitation of the hosting environment. However, the immediate deletion of files and the complexity of the attack significantly limit the practical impact. Organizations running this plugin on vulnerable versions face a low risk of compromise, but the presence of this vulnerability could be leveraged as part of a multi-stage attack chain. The threat is primarily to the integrity of the web application, with no direct impact on confidentiality or availability reported.
Mitigation Recommendations
Organizations should immediately verify if they are using the AR for WordPress plugin version 7.3 or earlier and plan to update to a patched version once available. In the interim, administrators should restrict file upload permissions and capabilities within WordPress to trusted users only. Implementing web application firewall (WAF) rules to detect and block double extension file uploads can reduce risk. Server administrators should ensure proper handling of file extensions and configure the server to reject or quarantine suspicious files before execution. Regularly monitoring upload directories for unauthorized files and enabling strict PHP execution policies (e.g., disabling PHP execution in upload directories) will further mitigate exploitation chances. Additionally, auditing logs for unusual upload activity and applying the principle of least privilege for plugin usage can help reduce exposure.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-12300: CWE-862 Missing Authorization in webandprint AR for WordPress
Description
CVE-2024-12300 is a low-severity vulnerability in the AR for WordPress plugin caused by missing authorization checks in the set_ar_featured_image() function. This flaw allows unauthenticated attackers to upload files with double extensions, potentially enabling PHP file uploads. However, the uploaded files are deleted immediately, and the attack only works on select server configurations, making exploitation unlikely. The vulnerability affects all versions up to 7. 3 of the plugin. No known exploits are currently in the wild. The CVSS score is 3. 7, reflecting low impact and high attack complexity. Organizations using this plugin should monitor for updates and consider restricting file upload capabilities and server configurations to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-12300 is a vulnerability identified in the AR for WordPress plugin, which is widely used to enhance WordPress functionality related to web and print features. The root cause is a missing authorization check (CWE-862) in the set_ar_featured_image() function, which fails to verify user capabilities before allowing file uploads. This omission enables unauthenticated attackers to perform a double extension file upload attack, where a file is named with two extensions (e.g., file.php.jpg) to bypass file type restrictions and upload executable PHP code. However, the plugin immediately deletes the uploaded file, and the attack only succeeds on certain server configurations that do not properly handle double extensions or file deletion timing. The vulnerability affects all versions up to and including 7.3. Despite the potential for unauthorized file uploads, the immediate deletion and limited server conditions reduce the likelihood of successful exploitation. The CVSS v3.1 score of 3.7 reflects a low-severity rating due to the lack of confidentiality impact, limited integrity impact, no availability impact, and the high complexity of attack. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability was publicly disclosed on December 13, 2024.
Potential Impact
If exploited, this vulnerability could allow an attacker to upload malicious PHP files to a WordPress site running the affected AR for WordPress plugin versions. Although the files are deleted immediately, on certain server configurations, the double extension technique might bypass security controls, potentially enabling remote code execution or unauthorized actions. This could lead to integrity compromise of the website, unauthorized content modification, or further exploitation of the hosting environment. However, the immediate deletion of files and the complexity of the attack significantly limit the practical impact. Organizations running this plugin on vulnerable versions face a low risk of compromise, but the presence of this vulnerability could be leveraged as part of a multi-stage attack chain. The threat is primarily to the integrity of the web application, with no direct impact on confidentiality or availability reported.
Mitigation Recommendations
Organizations should immediately verify if they are using the AR for WordPress plugin version 7.3 or earlier and plan to update to a patched version once available. In the interim, administrators should restrict file upload permissions and capabilities within WordPress to trusted users only. Implementing web application firewall (WAF) rules to detect and block double extension file uploads can reduce risk. Server administrators should ensure proper handling of file extensions and configure the server to reject or quarantine suspicious files before execution. Regularly monitoring upload directories for unauthorized files and enabling strict PHP execution policies (e.g., disabling PHP execution in upload directories) will further mitigate exploitation chances. Additionally, auditing logs for unusual upload activity and applying the principle of least privilege for plugin usage can help reduce exposure.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-06T13:28:58.342Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e35b7ef31ef0b597cd9
Added to database: 2/25/2026, 9:48:37 PM
Last enriched: 2/26/2026, 5:29:44 AM
Last updated: 2/26/2026, 7:12:01 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.