CVE-2024-12825: CWE-862 Missing Authorization in brechtvds Custom Related Posts
CVE-2024-12825 is a medium-severity vulnerability in the Custom Related Posts WordPress plugin (up to version 1. 7. 3) caused by missing authorization checks on three AJAX actions. Authenticated users with Subscriber-level access or higher can exploit this flaw to search posts and modify related post links without proper permissions. This vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires authentication but no user interaction beyond login. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or implementing access restrictions to mitigate risk. The threat primarily affects WordPress sites globally, especially in countries with high WordPress adoption. Due to the medium CVSS score (5.
AI Analysis
Technical Summary
CVE-2024-12825 is a vulnerability identified in the Custom Related Posts plugin for WordPress, maintained by brechtvds, affecting all versions up to and including 1.7.3. The root cause is a missing authorization (CWE-862) on three AJAX endpoints that handle searching posts and linking or unlinking related posts. These AJAX actions lack proper capability checks, allowing any authenticated user with at least Subscriber-level privileges to perform unauthorized operations. Specifically, attackers can search for posts and modify relationships between posts, actions normally restricted to higher privilege roles. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS 3.1 base score is 5.4, reflecting low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), and limited impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). Although no public exploits have been reported, the flaw presents a risk in environments where low-privileged users exist, such as multi-user WordPress sites or shared hosting. The absence of patches at the time of reporting means mitigation relies on access control or plugin updates when available. This vulnerability highlights the importance of enforcing capability checks on all AJAX actions in WordPress plugins to prevent privilege escalation or unauthorized data manipulation.
Potential Impact
The vulnerability allows authenticated users with minimal privileges (Subscriber-level) to bypass intended authorization controls and modify post relationships, potentially leading to unauthorized content manipulation. This can undermine data integrity by allowing unauthorized changes to related post links, which may affect site content presentation and user experience. Confidentiality impact is limited but present, as attackers can search posts they might not otherwise access. Availability is unaffected. For organizations, this could lead to content tampering, misinformation, or reputational damage if attackers manipulate related posts to mislead visitors. In multi-user or multi-tenant WordPress environments, the risk is higher due to the presence of multiple authenticated users with varying trust levels. Although no known exploits exist currently, the vulnerability could be leveraged in targeted attacks or combined with other flaws to escalate privileges or conduct further compromise.
Mitigation Recommendations
Organizations should immediately review user roles and restrict Subscriber-level accounts to trusted users only. Implement strict access controls and monitor AJAX requests to detect unusual activity related to post searching and linking. Disable or remove the Custom Related Posts plugin if not essential until a patch is released. If plugin updates become available, apply them promptly to enforce proper capability checks. Consider using Web Application Firewalls (WAFs) to block unauthorized AJAX calls targeting the vulnerable endpoints. Additionally, audit WordPress plugins for similar missing authorization issues and enforce a policy of least privilege for all authenticated users. Regularly monitor logs for suspicious modifications to post relationships and conduct security assessments on WordPress installations to identify and remediate similar vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-12825: CWE-862 Missing Authorization in brechtvds Custom Related Posts
Description
CVE-2024-12825 is a medium-severity vulnerability in the Custom Related Posts WordPress plugin (up to version 1. 7. 3) caused by missing authorization checks on three AJAX actions. Authenticated users with Subscriber-level access or higher can exploit this flaw to search posts and modify related post links without proper permissions. This vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires authentication but no user interaction beyond login. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or implementing access restrictions to mitigate risk. The threat primarily affects WordPress sites globally, especially in countries with high WordPress adoption. Due to the medium CVSS score (5.
AI-Powered Analysis
Technical Analysis
CVE-2024-12825 is a vulnerability identified in the Custom Related Posts plugin for WordPress, maintained by brechtvds, affecting all versions up to and including 1.7.3. The root cause is a missing authorization (CWE-862) on three AJAX endpoints that handle searching posts and linking or unlinking related posts. These AJAX actions lack proper capability checks, allowing any authenticated user with at least Subscriber-level privileges to perform unauthorized operations. Specifically, attackers can search for posts and modify relationships between posts, actions normally restricted to higher privilege roles. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS 3.1 base score is 5.4, reflecting low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), and limited impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). Although no public exploits have been reported, the flaw presents a risk in environments where low-privileged users exist, such as multi-user WordPress sites or shared hosting. The absence of patches at the time of reporting means mitigation relies on access control or plugin updates when available. This vulnerability highlights the importance of enforcing capability checks on all AJAX actions in WordPress plugins to prevent privilege escalation or unauthorized data manipulation.
Potential Impact
The vulnerability allows authenticated users with minimal privileges (Subscriber-level) to bypass intended authorization controls and modify post relationships, potentially leading to unauthorized content manipulation. This can undermine data integrity by allowing unauthorized changes to related post links, which may affect site content presentation and user experience. Confidentiality impact is limited but present, as attackers can search posts they might not otherwise access. Availability is unaffected. For organizations, this could lead to content tampering, misinformation, or reputational damage if attackers manipulate related posts to mislead visitors. In multi-user or multi-tenant WordPress environments, the risk is higher due to the presence of multiple authenticated users with varying trust levels. Although no known exploits exist currently, the vulnerability could be leveraged in targeted attacks or combined with other flaws to escalate privileges or conduct further compromise.
Mitigation Recommendations
Organizations should immediately review user roles and restrict Subscriber-level accounts to trusted users only. Implement strict access controls and monitor AJAX requests to detect unusual activity related to post searching and linking. Disable or remove the Custom Related Posts plugin if not essential until a patch is released. If plugin updates become available, apply them promptly to enforce proper capability checks. Consider using Web Application Firewalls (WAFs) to block unauthorized AJAX calls targeting the vulnerable endpoints. Additionally, audit WordPress plugins for similar missing authorization issues and enforce a policy of least privilege for all authenticated users. Regularly monitor logs for suspicious modifications to post relationships and conduct security assessments on WordPress installations to identify and remediate similar vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-19T21:19:58.518Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e49b7ef31ef0b59c583
Added to database: 2/25/2026, 9:48:57 PM
Last enriched: 2/26/2026, 2:47:04 AM
Last updated: 2/26/2026, 7:15:50 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.