Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12876: CWE-862 Missing Authorization in uxper Golo - City Travel Guide WordPress Theme

0
Critical
VulnerabilityCVE-2024-12876cvecve-2024-12876cwe-862
Published: Fri Mar 07 2025 (03/07/2025, 08:21:28 UTC)
Source: CVE Database V5
Vendor/Project: uxper
Product: Golo - City Travel Guide WordPress Theme

Description

CVE-2024-12876 is a critical privilege escalation vulnerability in the Golo - City Travel Guide WordPress theme (all versions up to 1. 6. 10). The flaw arises from missing authorization checks when updating user passwords, allowing unauthenticated attackers to change any user's password, including administrators. This enables attackers to take over accounts without any user interaction or prior authentication. The vulnerability has a CVSS score of 9. 8, reflecting its high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the ease of exploitation and severity make it a significant threat. Organizations using this theme should urgently apply patches or implement mitigations to prevent unauthorized access. Countries with large WordPress user bases and tourism-related websites are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:40:58 UTC

Technical Analysis

CVE-2024-12876 is a critical security vulnerability identified in the Golo - City Travel Guide WordPress theme developed by uxper. The vulnerability is classified under CWE-862 (Missing Authorization) and affects all versions up to and including 1.6.10. The core issue is that the theme does not properly verify a user's identity before allowing password updates. This missing authorization check permits unauthenticated attackers to change arbitrary users' passwords, including those of administrators. Consequently, attackers can escalate privileges by taking over accounts without needing any credentials or user interaction. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity with network attack vector, no required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. This flaw can lead to complete site takeover, data theft, defacement, or further malicious activities. No official patches or exploit code are currently publicly available, but the risk remains high due to the straightforward exploitation method. The vulnerability affects WordPress sites using this theme, which is commonly deployed for city travel guide websites, potentially impacting tourism-related businesses and content providers.

Potential Impact

The impact of CVE-2024-12876 is severe for organizations running the vulnerable Golo WordPress theme. An attacker can gain unauthorized administrative access by resetting any user's password, leading to full site compromise. This can result in data breaches, unauthorized content modification, defacement, malware injection, and disruption of services. For businesses relying on their websites for customer engagement or e-commerce, this could cause significant reputational damage and financial loss. The vulnerability also threatens the confidentiality of user data stored on affected sites. Since WordPress powers a large portion of the web, and this theme targets travel and tourism sectors, the scope of impact includes small to medium enterprises and travel agencies worldwide. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially as threat actors often target vulnerable WordPress themes and plugins.

Mitigation Recommendations

1. Immediately update the Golo - City Travel Guide WordPress theme to a patched version once available from the vendor. 2. If no patch is available, temporarily disable the theme or restrict access to password reset functionality via web application firewall (WAF) rules or custom code to enforce authorization checks. 3. Monitor web server and application logs for suspicious password reset attempts or unauthorized access. 4. Implement multi-factor authentication (MFA) for all administrator accounts to reduce the risk of account takeover. 5. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 6. Conduct a thorough security audit of WordPress installations to identify other potential vulnerabilities or misconfigurations. 7. Educate site administrators on the risks and signs of account compromise. 8. Consider using security plugins that can detect and block unauthorized password changes or brute force attempts. 9. Limit administrative privileges to only necessary users and review user roles periodically.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-20T21:37:33.506Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e4bb7ef31ef0b59c706

Added to database: 2/25/2026, 9:48:59 PM

Last enriched: 2/26/2026, 2:40:58 AM

Last updated: 2/26/2026, 7:32:51 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats