CVE-2024-12413: CWE-862 Missing Authorization in webwizardsdev MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution
CVE-2024-12413 is a medium severity vulnerability affecting the MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress. The flaw arises from missing authorization checks on critical functions such as deleting users, updating profile settings, and approving users. This allows unauthenticated attackers to perform privileged actions without any authentication or user interaction. The vulnerability impacts all versions up to and including 2. 0. 00. Although no known exploits are currently reported in the wild, the ease of exploitation and the potential to manipulate user accounts and settings pose significant risks. Organizations using this plugin in their WooCommerce multivendor marketplaces should prioritize patching or applying mitigations. Countries with large WordPress and WooCommerce user bases, especially those with significant e-commerce activity, are at higher risk. Immediate mitigation involves restricting access to vulnerable endpoints and monitoring for suspicious activity until an official patch is released.
AI Analysis
Technical Summary
CVE-2024-12413 is a missing authorization vulnerability (CWE-862) in the MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress, affecting all versions up to 2.0.00. The vulnerability stems from the absence of proper capability checks on multiple sensitive functions including 'marketking_delete_team_member', 'marketkingrejectuser', and 'marketking_save_profile_settings'. These functions control critical operations such as deleting users, rejecting or approving users, and modifying profile settings. Because these functions lack authorization enforcement, unauthenticated attackers can invoke them remotely without any credentials or user interaction. This leads to unauthorized modification of user accounts and marketplace settings, potentially disrupting marketplace operations and user trust. The CVSS 3.1 base score is 5.3 (medium severity), reflecting network attack vector, no privileges required, no user interaction, and limited impact on integrity without confidentiality or availability impact. No known exploits have been reported yet, but the vulnerability's nature makes it a significant risk for WooCommerce multivendor marketplaces using this plugin. The absence of patches at the time of disclosure necessitates immediate defensive measures by administrators.
Potential Impact
The vulnerability allows unauthenticated attackers to perform unauthorized actions such as deleting team members, modifying profile settings, and approving or rejecting users. This can lead to disruption of marketplace operations, loss of user accounts, unauthorized changes to marketplace configurations, and potential reputational damage. While the vulnerability does not directly expose confidential data or cause denial of service, the integrity of the marketplace environment is compromised. Attackers could manipulate vendor accounts or marketplace settings to their advantage, potentially facilitating fraud or further attacks. Organizations relying on this plugin for their e-commerce platforms face operational risks and potential financial losses if exploited. The ease of exploitation without authentication increases the threat level, especially for marketplaces with high user activity and valuable transactions.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict access controls at the web server or application firewall level to restrict access to the vulnerable plugin endpoints. Employing Web Application Firewalls (WAFs) with custom rules to block requests targeting functions like 'marketking_delete_team_member' and 'marketkingrejectuser' can reduce exposure. Monitoring logs for unusual or unauthorized requests to these endpoints is critical for early detection. Administrators should also review user roles and permissions within WordPress and WooCommerce to minimize privileges where possible. Keeping the WordPress core, WooCommerce, and all plugins updated is essential. Once a patch becomes available, immediate application is mandatory. Additionally, consider isolating the marketplace environment and enforcing multi-factor authentication for administrative accounts to limit the impact of any unauthorized changes.
Affected Countries
United States, India, United Kingdom, Germany, Canada, Australia, Brazil, France, Netherlands, Japan, Italy, Spain
CVE-2024-12413: CWE-862 Missing Authorization in webwizardsdev MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution
Description
CVE-2024-12413 is a medium severity vulnerability affecting the MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress. The flaw arises from missing authorization checks on critical functions such as deleting users, updating profile settings, and approving users. This allows unauthenticated attackers to perform privileged actions without any authentication or user interaction. The vulnerability impacts all versions up to and including 2. 0. 00. Although no known exploits are currently reported in the wild, the ease of exploitation and the potential to manipulate user accounts and settings pose significant risks. Organizations using this plugin in their WooCommerce multivendor marketplaces should prioritize patching or applying mitigations. Countries with large WordPress and WooCommerce user bases, especially those with significant e-commerce activity, are at higher risk. Immediate mitigation involves restricting access to vulnerable endpoints and monitoring for suspicious activity until an official patch is released.
AI-Powered Analysis
Technical Analysis
CVE-2024-12413 is a missing authorization vulnerability (CWE-862) in the MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress, affecting all versions up to 2.0.00. The vulnerability stems from the absence of proper capability checks on multiple sensitive functions including 'marketking_delete_team_member', 'marketkingrejectuser', and 'marketking_save_profile_settings'. These functions control critical operations such as deleting users, rejecting or approving users, and modifying profile settings. Because these functions lack authorization enforcement, unauthenticated attackers can invoke them remotely without any credentials or user interaction. This leads to unauthorized modification of user accounts and marketplace settings, potentially disrupting marketplace operations and user trust. The CVSS 3.1 base score is 5.3 (medium severity), reflecting network attack vector, no privileges required, no user interaction, and limited impact on integrity without confidentiality or availability impact. No known exploits have been reported yet, but the vulnerability's nature makes it a significant risk for WooCommerce multivendor marketplaces using this plugin. The absence of patches at the time of disclosure necessitates immediate defensive measures by administrators.
Potential Impact
The vulnerability allows unauthenticated attackers to perform unauthorized actions such as deleting team members, modifying profile settings, and approving or rejecting users. This can lead to disruption of marketplace operations, loss of user accounts, unauthorized changes to marketplace configurations, and potential reputational damage. While the vulnerability does not directly expose confidential data or cause denial of service, the integrity of the marketplace environment is compromised. Attackers could manipulate vendor accounts or marketplace settings to their advantage, potentially facilitating fraud or further attacks. Organizations relying on this plugin for their e-commerce platforms face operational risks and potential financial losses if exploited. The ease of exploitation without authentication increases the threat level, especially for marketplaces with high user activity and valuable transactions.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict access controls at the web server or application firewall level to restrict access to the vulnerable plugin endpoints. Employing Web Application Firewalls (WAFs) with custom rules to block requests targeting functions like 'marketking_delete_team_member' and 'marketkingrejectuser' can reduce exposure. Monitoring logs for unusual or unauthorized requests to these endpoints is critical for early detection. Administrators should also review user roles and permissions within WordPress and WooCommerce to minimize privileges where possible. Keeping the WordPress core, WooCommerce, and all plugins updated is essential. Once a patch becomes available, immediate application is mandatory. Additionally, consider isolating the marketplace environment and enforcing multi-factor authentication for administrative accounts to limit the impact of any unauthorized changes.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-10T15:41:24.508Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e3ab7ef31ef0b598215
Added to database: 2/25/2026, 9:48:42 PM
Last enriched: 2/26/2026, 4:59:26 AM
Last updated: 2/26/2026, 6:13:13 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.