Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12827: CWE-620 Unverified Password Change in scriptsbundle DWT - Directory & Listing WordPress Theme

0
Critical
VulnerabilityCVE-2024-12827cvecve-2024-12827cwe-620
Published: Fri Jun 27 2025 (06/27/2025, 08:23:57 UTC)
Source: CVE Database V5
Vendor/Project: scriptsbundle
Product: DWT - Directory & Listing WordPress Theme

Description

CVE-2024-12827 is a critical vulnerability in the DWT - Directory & Listing WordPress Theme affecting all versions up to 3. 3. 6. It allows unauthenticated attackers to reset arbitrary users' passwords, including administrators, due to improper validation of the password reset token in the dwt_listing_reset_password() function. This flaw enables privilege escalation and account takeover without any user interaction or authentication. The vulnerability has a CVSS score of 9. 8, reflecting its high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using this theme are at significant risk of unauthorized access and should prioritize patching or applying mitigations immediately. Countries with large WordPress user bases and significant use of this theme, especially in sectors relying on directory and listing services, are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:46:32 UTC

Technical Analysis

CVE-2024-12827 is a critical security vulnerability identified in the DWT - Directory & Listing WordPress Theme, a popular theme used for directory and listing websites. The vulnerability arises from the theme's failure to properly verify the presence and validity of a password reset token before allowing a password change via the dwt_listing_reset_password() function. Specifically, the function does not check if the token value is empty, enabling unauthenticated attackers to bypass the intended password reset workflow. This flaw permits attackers to reset the passwords of arbitrary users, including those with administrative privileges, effectively enabling full account takeover. The vulnerability affects all versions up to and including 3.3.6. The CVSS v3.1 base score is 9.8, indicating a critical severity level, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality (C:H), integrity (I:H), and availability (A:H). Although no known exploits have been reported in the wild yet, the ease of exploitation and the potential for complete system compromise make this a highly urgent issue. The vulnerability is classified under CWE-620, which relates to unverified password changes, a common and dangerous security weakness in authentication mechanisms.

Potential Impact

The impact of CVE-2024-12827 is severe for organizations using the affected WordPress theme. An attacker can gain unauthorized access to any user account, including administrators, by resetting their passwords without authentication. This leads to full compromise of the website, allowing attackers to manipulate content, steal sensitive data, install malware, or pivot to other internal systems. The integrity and availability of the affected websites are at high risk, potentially resulting in service disruption, reputational damage, and data breaches. Since WordPress powers a significant portion of the web, and directory/listing sites often contain valuable business or user information, the threat extends to many sectors including e-commerce, real estate, local business directories, and classified ads platforms. The lack of user interaction and authentication requirements lowers the barrier for exploitation, increasing the likelihood of automated attacks and widespread compromise if left unmitigated.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the DWT - Directory & Listing WordPress Theme to a patched version once it becomes available from the vendor. Until a patch is released, administrators should consider disabling the password reset functionality provided by the theme or implementing additional server-side validation to ensure that password reset tokens are properly checked and validated. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious password reset requests targeting the vulnerable function can reduce exposure. Monitoring logs for unusual password reset activities and enforcing multi-factor authentication (MFA) for all administrator accounts can limit the impact of potential account takeovers. Additionally, regular backups and incident response plans should be in place to recover quickly from any compromise. Organizations should also audit their WordPress installations to identify if this theme is in use and prioritize remediation accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-19T21:44:06.338Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e49b7ef31ef0b59c58e

Added to database: 2/25/2026, 9:48:57 PM

Last enriched: 2/26/2026, 2:46:32 AM

Last updated: 2/26/2026, 7:16:51 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats