Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12881: CWE-862 Missing Authorization in giuse PlugVersions – Easily rollback to previous versions of your plugins

0
High
VulnerabilityCVE-2024-12881cvecve-2024-12881cwe-862
Published: Tue Dec 24 2024 (12/24/2024, 09:21:51 UTC)
Source: CVE Database V5
Vendor/Project: giuse
Product: PlugVersions – Easily rollback to previous versions of your plugins

Description

CVE-2024-12881 is a high-severity vulnerability in the WordPress plugin 'PlugVersions – Easily rollback to previous versions of your plugins' by giuse. It arises from a missing authorization check in the eos_plugin_reviews_restore_version() function, allowing authenticated users with Subscriber-level access or higher to upload arbitrary files. This vulnerability can lead to full compromise of the affected WordPress site, impacting confidentiality, integrity, and availability. Exploitation requires no user interaction beyond authentication, and the attack can be performed remotely over the network. No patches are currently available, and no known exploits have been observed in the wild yet. Organizations using this plugin should urgently restrict access, monitor for suspicious activity, and prepare to apply updates once released. Countries with significant WordPress usage and large web hosting sectors are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:30:20 UTC

Technical Analysis

CVE-2024-12881 is a critical vulnerability affecting all versions up to and including 0.0.7 of the 'PlugVersions – Easily rollback to previous versions of your plugins' WordPress plugin developed by giuse. The root cause is a missing capability check (authorization) in the eos_plugin_reviews_restore_version() function, which is responsible for restoring previous plugin versions. Due to this missing authorization, any authenticated user with at least Subscriber-level privileges can exploit the vulnerability to upload arbitrary files to the server. This arbitrary file upload can be leveraged to execute malicious code, potentially leading to full site compromise including data theft, defacement, or further pivoting within the hosting environment. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication, which is relatively easy to obtain on many WordPress sites due to common user registrations or weak credential policies. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, combined with low attack complexity and low privileges required. No patches or fixes have been published at the time of disclosure, and no known exploits are currently reported in the wild. This vulnerability falls under CWE-862 (Missing Authorization), highlighting the failure to properly restrict access to sensitive functionality. Given the widespread use of WordPress and the plugin’s functionality, this vulnerability poses a significant risk to many websites worldwide.

Potential Impact

The impact of CVE-2024-12881 is severe for organizations running WordPress sites with the vulnerable PlugVersions plugin. Attackers with minimal privileges can escalate their access by uploading arbitrary files, leading to remote code execution, data breaches, site defacement, or complete takeover of the web server. This compromises the confidentiality of sensitive data stored or processed by the site, the integrity of website content and configurations, and the availability of the service. For e-commerce, financial, healthcare, or government websites, such a compromise could result in significant financial losses, reputational damage, regulatory penalties, and operational disruptions. The ease of exploitation and the low privilege requirement increase the likelihood of attacks, especially on sites that allow user registrations or have weak access controls. Additionally, compromised sites can be used as launchpads for further attacks against internal networks or other connected systems, amplifying the threat. The absence of a patch means organizations must rely on temporary mitigations, increasing exposure time. Overall, this vulnerability represents a critical risk to the security posture of affected WordPress installations globally.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations to reduce risk: 1) Restrict plugin usage to trusted administrators only by disabling or removing the plugin on sites where it is not essential. 2) Harden user access controls by limiting Subscriber-level accounts and reviewing user roles to ensure minimal privileges. 3) Monitor web server and WordPress logs for unusual file uploads or suspicious activity related to plugin version restoration functions. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block requests targeting the eos_plugin_reviews_restore_version() function or unusual POST requests that could indicate exploitation attempts. 5) Disable or restrict file write permissions on the WordPress installation directories where possible to prevent unauthorized file creation. 6) Educate site administrators about the risk and encourage immediate removal or deactivation of the vulnerable plugin until a patch is available. 7) Regularly back up website data and configurations to enable rapid recovery in case of compromise. 8) Stay alert for updates from the plugin vendor or WordPress security advisories and apply patches promptly once released. These targeted actions go beyond generic advice by focusing on access control tightening, monitoring, and proactive defense tailored to the vulnerability’s exploitation vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-20T22:08:57.044Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e4bb7ef31ef0b59c712

Added to database: 2/25/2026, 9:48:59 PM

Last enriched: 2/26/2026, 2:30:20 AM

Last updated: 2/26/2026, 7:35:40 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats