Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12825: CWE-862 Missing Authorization in brechtvds Custom Related Posts

0
Medium
VulnerabilityCVE-2024-12825cvecve-2024-12825cwe-862
Published: Sat Feb 01 2025 (02/01/2025, 07:21:37 UTC)
Source: CVE Database V5
Vendor/Project: brechtvds
Product: Custom Related Posts

Description

CVE-2024-12825 is a medium-severity vulnerability in the Custom Related Posts WordPress plugin (up to version 1. 7. 3) caused by missing authorization checks on three AJAX actions. Authenticated users with Subscriber-level access or higher can exploit this flaw to search posts and modify related post links without proper permissions. This vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires authentication but no user interaction beyond login. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or implementing access restrictions to mitigate risk. The threat primarily affects WordPress sites globally, especially in countries with high WordPress adoption. Due to the medium CVSS score (5.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:47:04 UTC

Technical Analysis

CVE-2024-12825 is a vulnerability identified in the Custom Related Posts plugin for WordPress, maintained by brechtvds, affecting all versions up to and including 1.7.3. The root cause is a missing authorization (CWE-862) on three AJAX endpoints that handle searching posts and linking or unlinking related posts. These AJAX actions lack proper capability checks, allowing any authenticated user with at least Subscriber-level privileges to perform unauthorized operations. Specifically, attackers can search for posts and modify relationships between posts, actions normally restricted to higher privilege roles. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS 3.1 base score is 5.4, reflecting low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), and limited impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). Although no public exploits have been reported, the flaw presents a risk in environments where low-privileged users exist, such as multi-user WordPress sites or shared hosting. The absence of patches at the time of reporting means mitigation relies on access control or plugin updates when available. This vulnerability highlights the importance of enforcing capability checks on all AJAX actions in WordPress plugins to prevent privilege escalation or unauthorized data manipulation.

Potential Impact

The vulnerability allows authenticated users with minimal privileges (Subscriber-level) to bypass intended authorization controls and modify post relationships, potentially leading to unauthorized content manipulation. This can undermine data integrity by allowing unauthorized changes to related post links, which may affect site content presentation and user experience. Confidentiality impact is limited but present, as attackers can search posts they might not otherwise access. Availability is unaffected. For organizations, this could lead to content tampering, misinformation, or reputational damage if attackers manipulate related posts to mislead visitors. In multi-user or multi-tenant WordPress environments, the risk is higher due to the presence of multiple authenticated users with varying trust levels. Although no known exploits exist currently, the vulnerability could be leveraged in targeted attacks or combined with other flaws to escalate privileges or conduct further compromise.

Mitigation Recommendations

Organizations should immediately review user roles and restrict Subscriber-level accounts to trusted users only. Implement strict access controls and monitor AJAX requests to detect unusual activity related to post searching and linking. Disable or remove the Custom Related Posts plugin if not essential until a patch is released. If plugin updates become available, apply them promptly to enforce proper capability checks. Consider using Web Application Firewalls (WAFs) to block unauthorized AJAX calls targeting the vulnerable endpoints. Additionally, audit WordPress plugins for similar missing authorization issues and enforce a policy of least privilege for all authenticated users. Regularly monitor logs for suspicious modifications to post relationships and conduct security assessments on WordPress installations to identify and remediate similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-19T21:19:58.518Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e49b7ef31ef0b59c583

Added to database: 2/25/2026, 9:48:57 PM

Last enriched: 2/26/2026, 2:47:04 AM

Last updated: 2/26/2026, 7:15:50 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats