Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12329: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in g5theme Essential Real Estate

0
Medium
VulnerabilityCVE-2024-12329cvecve-2024-12329cwe-200
Published: Thu Dec 12 2024 (12/12/2024, 06:46:35 UTC)
Source: CVE Database V5
Vendor/Project: g5theme
Product: Essential Real Estate

Description

CVE-2024-12329 is a medium severity vulnerability in the Essential Real Estate WordPress plugin by g5theme, affecting all versions up to 5. 1. 6. The flaw arises from missing capability checks on certain pages and post types, allowing authenticated users with Contributor-level access or higher to view sensitive data such as invoices and transaction logs without proper authorization. Exploitation requires no user interaction but does require at least Contributor privileges. The vulnerability impacts confidentiality but does not affect integrity or availability. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize access control reviews and apply any forthcoming patches or implement compensating controls to restrict access to sensitive data. Countries with significant WordPress usage and real estate sectors are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:27:34 UTC

Technical Analysis

CVE-2024-12329 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the Essential Real Estate plugin for WordPress, developed by g5theme. This plugin, widely used for managing real estate listings and related transactions, contains a missing capability check on several pages and post types in all versions up to and including 5.1.6. Specifically, authenticated users with Contributor-level access or higher can bypass intended access restrictions to view sensitive information such as invoices and transaction logs. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The attacker must have some level of authenticated access (PR:L), but no further privileges are needed. The scope is unchanged (S:U), and the impact is limited to confidentiality (C:L), with no impact on integrity or availability. This flaw could allow insider threats or compromised accounts with Contributor privileges to harvest sensitive financial data, potentially leading to privacy violations or further targeted attacks. No patches or exploit code are currently publicly available, but the vulnerability is officially published and tracked. The plugin’s lack of proper authorization checks on sensitive data endpoints is the root cause, highlighting the need for stricter role-based access control enforcement in WordPress plugins handling sensitive information.

Potential Impact

The primary impact of CVE-2024-12329 is unauthorized disclosure of sensitive financial information such as invoices and transaction logs to users who should not have access. This exposure can lead to privacy breaches, loss of customer trust, and potential regulatory compliance issues, especially in jurisdictions with strict data protection laws. Organizations using the Essential Real Estate plugin on WordPress sites may face insider threats or exploitation by compromised Contributor-level accounts. Although the vulnerability does not affect data integrity or system availability, the confidentiality breach could facilitate further attacks, such as social engineering or fraud. The medium CVSS score reflects the moderate risk due to required authentication but low complexity and network accessibility. Real estate businesses, agencies, and platforms relying on this plugin could suffer reputational damage and financial losses if sensitive transactional data is leaked. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often target WordPress plugins due to their widespread use.

Mitigation Recommendations

1. Immediately audit user roles and permissions on WordPress sites using the Essential Real Estate plugin, ensuring that only trusted users have Contributor-level or higher access. 2. Implement strict role-based access controls and consider restricting Contributor roles from accessing sensitive pages or post types until a patch is available. 3. Monitor access logs for unusual activity related to invoice and transaction data pages to detect potential exploitation attempts. 4. If possible, disable or restrict access to the affected plugin features temporarily in high-risk environments. 5. Stay informed on updates from g5theme and apply security patches promptly once released. 6. Consider deploying Web Application Firewalls (WAFs) with custom rules to block unauthorized access attempts to sensitive endpoints. 7. Educate site administrators and users about the risk of privilege escalation and the importance of strong authentication practices. 8. Review and harden WordPress security configurations, including limiting plugin installations and enforcing least privilege principles. 9. For critical environments, consider isolating sensitive data storage or using additional encryption to mitigate exposure risks. 10. Conduct regular security assessments and penetration testing focused on plugin vulnerabilities and access control weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-06T21:32:09.785Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e37b7ef31ef0b597eed

Added to database: 2/25/2026, 9:48:39 PM

Last enriched: 2/26/2026, 5:27:34 AM

Last updated: 2/26/2026, 7:26:25 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats