Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12413: CWE-862 Missing Authorization in webwizardsdev MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution

0
Medium
VulnerabilityCVE-2024-12413cvecve-2024-12413cwe-862
Published: Wed Dec 25 2024 (12/25/2024, 03:21:31 UTC)
Source: CVE Database V5
Vendor/Project: webwizardsdev
Product: MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution

Description

CVE-2024-12413 is a medium severity vulnerability affecting the MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress. The flaw arises from missing authorization checks on critical functions such as deleting users, updating profile settings, and approving users. This allows unauthenticated attackers to perform privileged actions without any authentication or user interaction. The vulnerability impacts all versions up to and including 2. 0. 00. Although no known exploits are currently reported in the wild, the ease of exploitation and the potential to manipulate user accounts and settings pose significant risks. Organizations using this plugin in their WooCommerce multivendor marketplaces should prioritize patching or applying mitigations. Countries with large WordPress and WooCommerce user bases, especially those with significant e-commerce activity, are at higher risk. Immediate mitigation involves restricting access to vulnerable endpoints and monitoring for suspicious activity until an official patch is released.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:59:26 UTC

Technical Analysis

CVE-2024-12413 is a missing authorization vulnerability (CWE-862) in the MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress, affecting all versions up to 2.0.00. The vulnerability stems from the absence of proper capability checks on multiple sensitive functions including 'marketking_delete_team_member', 'marketkingrejectuser', and 'marketking_save_profile_settings'. These functions control critical operations such as deleting users, rejecting or approving users, and modifying profile settings. Because these functions lack authorization enforcement, unauthenticated attackers can invoke them remotely without any credentials or user interaction. This leads to unauthorized modification of user accounts and marketplace settings, potentially disrupting marketplace operations and user trust. The CVSS 3.1 base score is 5.3 (medium severity), reflecting network attack vector, no privileges required, no user interaction, and limited impact on integrity without confidentiality or availability impact. No known exploits have been reported yet, but the vulnerability's nature makes it a significant risk for WooCommerce multivendor marketplaces using this plugin. The absence of patches at the time of disclosure necessitates immediate defensive measures by administrators.

Potential Impact

The vulnerability allows unauthenticated attackers to perform unauthorized actions such as deleting team members, modifying profile settings, and approving or rejecting users. This can lead to disruption of marketplace operations, loss of user accounts, unauthorized changes to marketplace configurations, and potential reputational damage. While the vulnerability does not directly expose confidential data or cause denial of service, the integrity of the marketplace environment is compromised. Attackers could manipulate vendor accounts or marketplace settings to their advantage, potentially facilitating fraud or further attacks. Organizations relying on this plugin for their e-commerce platforms face operational risks and potential financial losses if exploited. The ease of exploitation without authentication increases the threat level, especially for marketplaces with high user activity and valuable transactions.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict access controls at the web server or application firewall level to restrict access to the vulnerable plugin endpoints. Employing Web Application Firewalls (WAFs) with custom rules to block requests targeting functions like 'marketking_delete_team_member' and 'marketkingrejectuser' can reduce exposure. Monitoring logs for unusual or unauthorized requests to these endpoints is critical for early detection. Administrators should also review user roles and permissions within WordPress and WooCommerce to minimize privileges where possible. Keeping the WordPress core, WooCommerce, and all plugins updated is essential. Once a patch becomes available, immediate application is mandatory. Additionally, consider isolating the marketplace environment and enforcing multi-factor authentication for administrative accounts to limit the impact of any unauthorized changes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-10T15:41:24.508Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e3ab7ef31ef0b598215

Added to database: 2/25/2026, 9:48:42 PM

Last enriched: 2/26/2026, 4:59:26 AM

Last updated: 2/26/2026, 6:13:13 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats