Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12821: CWE-862 Missing Authorization in DeluxeThemes Media Manager for UserPro

0
High
VulnerabilityCVE-2024-12821cvecve-2024-12821cwe-862
Published: Thu Jan 30 2025 (01/30/2025, 13:42:02 UTC)
Source: CVE Database V5
Vendor/Project: DeluxeThemes
Product: Media Manager for UserPro

Description

CVE-2024-12821 is a high-severity vulnerability in the Media Manager for UserPro WordPress plugin by DeluxeThemes. It arises from a missing authorization check in the upm_upload_media() function, allowing authenticated users with Subscriber-level access or higher to modify arbitrary WordPress options. Attackers can exploit this to change the default user role to administrator and enable user registration, thereby escalating privileges and gaining full administrative control over the site. The vulnerability affects all versions up to and including 3. 12. 0. Exploitation requires no user interaction beyond authentication, and the attack can be performed remotely over the network. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent site takeover.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:56:12 UTC

Technical Analysis

CVE-2024-12821 is a critical authorization bypass vulnerability classified under CWE-862, found in the Media Manager for UserPro plugin for WordPress developed by DeluxeThemes. The root cause is a missing capability check in the upm_upload_media() function, which is responsible for handling media uploads. This flaw allows any authenticated user with at least Subscriber-level privileges to invoke this function and update arbitrary WordPress options without proper authorization. Specifically, attackers can modify the 'default_role' option to 'administrator' and enable user registration, effectively allowing them to create new admin accounts on the affected WordPress site. This vulnerability affects all versions of the plugin up to and including 3.12.0. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The vulnerability is remotely exploitable over the network and does not require elevated privileges beyond Subscriber access. Although no public exploits have been reported yet, the ease of exploitation and potential for complete site compromise make this a critical threat. The absence of a patch link suggests that a fix may not yet be publicly available, increasing urgency for mitigation. This vulnerability highlights the importance of proper authorization checks in WordPress plugins, especially those that handle user-generated content and site configuration.

Potential Impact

The impact of CVE-2024-12821 is severe for organizations running WordPress sites with the Media Manager for UserPro plugin. Exploitation allows low-privileged authenticated users to escalate their privileges to full administrator, leading to complete site takeover. This can result in unauthorized access to sensitive data, defacement, insertion of malicious code or backdoors, disruption of site availability, and loss of trust from users and customers. For e-commerce, membership, or content management sites, this could mean theft of personal information, financial fraud, or reputational damage. Since WordPress powers a significant portion of the web, and this plugin is used in various industries, the scope of potential impact is broad. Attackers do not need to bypass authentication, only to compromise or create a Subscriber-level account, which is often easier to obtain. The vulnerability also enables attackers to manipulate site registration settings, facilitating persistent unauthorized access. Without timely mitigation, organizations face high risk of compromise and operational disruption.

Mitigation Recommendations

To mitigate CVE-2024-12821, organizations should immediately audit their WordPress installations for the presence of the Media Manager for UserPro plugin and its version. If the plugin is installed, restrict Subscriber-level user creation and monitor existing Subscriber accounts for suspicious activity. Disable user registration temporarily if not required. Implement Web Application Firewall (WAF) rules to block or monitor requests invoking the upm_upload_media() function or suspicious option update attempts. Limit plugin usage to trusted administrators and consider removing or replacing the plugin if no patch is available. Regularly review WordPress option changes and enable logging to detect unauthorized modifications. Follow best practices for WordPress security, including least privilege principles for user roles and strong authentication mechanisms. Stay alert for official patches or updates from DeluxeThemes and apply them promptly once released. Additionally, conduct penetration testing focused on privilege escalation vectors to identify any residual risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-19T20:42:21.563Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e48b7ef31ef0b59c4e5

Added to database: 2/25/2026, 9:48:56 PM

Last enriched: 2/26/2026, 2:56:12 AM

Last updated: 2/26/2026, 8:30:58 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats