Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12610: CWE-862 Missing Authorization in dasinfomedia School Management System for Wordpress

0
Medium
VulnerabilityCVE-2024-12610cvecve-2024-12610cwe-862
Published: Fri Mar 07 2025 (03/07/2025, 08:21:26 UTC)
Source: CVE Database V5
Vendor/Project: dasinfomedia
Product: School Management System for Wordpress

Description

CVE-2024-12610 is a medium severity vulnerability in the dasinfomedia School Management System plugin for WordPress, affecting all versions up to 93. 0. 0. It arises from missing authorization checks on two AJAX actions ('mj_smgt_remove_feetype' and 'mj_smgt_remove_category_new'), allowing unauthenticated attackers to delete arbitrary posts. The vulnerability does not impact confidentiality or availability but leads to integrity loss by enabling unauthorized data deletion. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to websites using this plugin, particularly educational institutions relying on it for managing school data. Mitigation involves applying patches once available or implementing strict access controls and monitoring AJAX endpoints. Countries with significant WordPress usage and educational institutions using this plugin, such as the United States, India, Brazil, United Kingdom, and Australia, are most at risk. Organizations should prioritize timely updates and audit plugin usage to reduce exposure.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:28:11 UTC

Technical Analysis

CVE-2024-12610 identifies a missing authorization vulnerability (CWE-862) in the dasinfomedia School Management System plugin for WordPress, affecting all versions up to 93.0.0. The flaw exists because the plugin fails to perform capability checks on two AJAX actions: 'mj_smgt_remove_feetype' and 'mj_smgt_remove_category_new'. These AJAX endpoints are intended to allow authorized users to remove fee types and categories within the school management system. However, due to the missing authorization, unauthenticated attackers can invoke these actions remotely to delete arbitrary posts on the WordPress site. This unauthorized deletion compromises data integrity by allowing attackers to remove content without permission. The vulnerability does not affect confidentiality or availability directly, as it does not expose sensitive data or cause denial of service. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation (no authentication or user interaction required) but limited impact scope (integrity loss only). No patches were linked at the time of publication, and no known exploits have been reported in the wild. The vulnerability is particularly concerning for educational institutions using this plugin to manage critical school data, as unauthorized deletions could disrupt operations or cause data loss. Detection and mitigation require monitoring AJAX requests and ensuring proper authorization checks are enforced on these endpoints.

Potential Impact

The primary impact of CVE-2024-12610 is unauthorized data deletion, which affects the integrity of the affected WordPress sites using the dasinfomedia School Management System plugin. Organizations relying on this plugin, especially educational institutions, may face operational disruptions if critical fee types or category data are deleted maliciously. Although the vulnerability does not expose confidential information or cause denial of service, the loss of data integrity can lead to administrative overhead, loss of trust, and potential compliance issues if records are altered or removed without authorization. The ease of exploitation—requiring no authentication or user interaction—means attackers can remotely target vulnerable sites at scale. This could lead to widespread defacement or data manipulation campaigns against educational websites. The absence of known exploits in the wild suggests limited active exploitation currently, but the vulnerability remains a significant risk until patched or mitigated. Organizations with public-facing WordPress sites using this plugin are particularly vulnerable to automated attacks or opportunistic attackers scanning for this flaw.

Mitigation Recommendations

1. Apply official patches or updates from dasinfomedia as soon as they become available to ensure proper authorization checks are implemented on the vulnerable AJAX actions. 2. In the absence of patches, restrict access to the affected AJAX endpoints by implementing web application firewall (WAF) rules that block unauthenticated requests targeting 'mj_smgt_remove_feetype' and 'mj_smgt_remove_category_new'. 3. Limit plugin usage to trusted administrators and disable or remove the plugin if it is not essential to reduce attack surface. 4. Monitor web server and WordPress logs for suspicious AJAX requests or unusual deletion activities related to fee types and categories. 5. Conduct regular backups of WordPress content and database to enable recovery from unauthorized deletions. 6. Employ principle of least privilege for WordPress user roles to minimize damage if exploitation occurs. 7. Consider deploying security plugins that can detect and block unauthorized AJAX calls or anomalous behavior. 8. Educate site administrators about the risks of unauthorized plugin actions and encourage timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-13T14:01:57.325Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e44b7ef31ef0b59c03d

Added to database: 2/25/2026, 9:48:52 PM

Last enriched: 2/26/2026, 3:28:11 AM

Last updated: 2/26/2026, 6:13:43 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats