Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12341: CWE-862 Missing Authorization in mahendrapatidarmp Custom Skins Contact Form 7

0
Medium
VulnerabilityCVE-2024-12341cvecve-2024-12341cwe-862
Published: Thu Dec 12 2024 (12/12/2024, 03:23:04 UTC)
Source: CVE Database V5
Vendor/Project: mahendrapatidarmp
Product: Custom Skins Contact Form 7

Description

CVE-2024-12341 is a medium severity vulnerability in the Custom Skins Contact Form 7 WordPress plugin by mahendrapatidarmp. It arises from a missing authorization check in the 'cf7cs_action_callback' function, allowing authenticated users with Subscriber-level access or higher to modify post content and create new skins without proper permissions. The vulnerability does not require user interaction and can be exploited remotely over the network. Although it does not impact confidentiality or availability, it allows integrity compromise by unauthorized content modification. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying access restrictions to mitigate risk. Countries with high WordPress usage and significant adoption of this plugin are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:14:07 UTC

Technical Analysis

CVE-2024-12341 is a vulnerability classified under CWE-862 (Missing Authorization) affecting all versions up to and including 1.0 of the Custom Skins Contact Form 7 plugin for WordPress, developed by mahendrapatidarmp. The root cause is the absence of a capability check in the 'cf7cs_action_callback' function, which handles certain plugin actions. This flaw allows any authenticated user with at least Subscriber-level privileges to bypass intended authorization controls and perform unauthorized modifications, including updating the content of any post and creating new skins within the plugin. The vulnerability is exploitable remotely over the network without requiring user interaction, and no elevated privileges beyond Subscriber are necessary. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the limited impact on confidentiality and availability but a notable impact on integrity. No patches or fixes have been linked yet, and no known exploits have been observed in the wild. The vulnerability could be leveraged by attackers who have gained low-level access to a WordPress site to escalate their influence by altering site content or plugin skins, potentially facilitating further attacks or defacement.

Potential Impact

The primary impact of CVE-2024-12341 is unauthorized modification of website content and plugin skins, which compromises the integrity of affected WordPress sites. Attackers with Subscriber-level access can alter posts and create new skins, potentially leading to misinformation, defacement, or embedding malicious content. While confidentiality and availability are not directly affected, the integrity breach can undermine user trust and damage organizational reputation. For organizations relying on this plugin, especially those with multiple users having Subscriber or higher roles, the risk of internal misuse or exploitation by compromised accounts is significant. This vulnerability could also serve as a foothold for further attacks, such as privilege escalation or persistent backdoors, if combined with other weaknesses. The lack of known exploits reduces immediate risk, but the ease of exploitation and widespread use of WordPress make it a relevant threat to many websites globally.

Mitigation Recommendations

To mitigate CVE-2024-12341, organizations should immediately restrict Subscriber-level user capabilities to the minimum necessary, ensuring that untrusted users cannot authenticate or gain Subscriber roles. Administrators should monitor user roles and audit recent post modifications for unauthorized changes. Until an official patch is released, consider disabling or removing the Custom Skins Contact Form 7 plugin if it is not essential. For sites that must keep the plugin, implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the 'cf7cs_action_callback' function. Additionally, apply strict access controls on the WordPress admin area, including multi-factor authentication for all users with elevated privileges. Regularly update WordPress core and plugins to the latest versions once a patch is available. Finally, maintain comprehensive backups to restore content integrity if unauthorized changes occur.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-07T00:29:59.350Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e38b7ef31ef0b597fbf

Added to database: 2/25/2026, 9:48:40 PM

Last enriched: 2/26/2026, 5:14:07 AM

Last updated: 2/26/2026, 6:57:23 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats