Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12920: CWE-862 Missing Authorization in Chimpstudio FoodBakery | Delivery Restaurant Directory WordPress Theme

0
High
VulnerabilityCVE-2024-12920cvecve-2024-12920cwe-862
Published: Wed Mar 19 2025 (03/19/2025, 11:10:38 UTC)
Source: CVE Database V5
Vendor/Project: Chimpstudio
Product: FoodBakery | Delivery Restaurant Directory WordPress Theme

Description

CVE-2024-12920 is a high-severity vulnerability affecting all versions of the FoodBakery Delivery Restaurant Directory WordPress Theme by Chimpstudio. It stems from missing authorization checks in multiple theme functions, allowing authenticated users with Subscriber-level access or higher to perform unauthorized actions. These actions include deleting arbitrary files, modifying theme options, exporting and importing widget settings, generating and restoring backups, and resetting theme options. The vulnerability does not require user interaction and can be exploited remotely over the network. Although no known exploits are currently reported in the wild, the impact on confidentiality, integrity, and availability is severe. Organizations using this theme on WordPress sites are at risk of data loss, site defacement, or persistent unauthorized configuration changes. Immediate mitigation involves restricting user roles, monitoring for suspicious activity, and applying patches once available. Countries with significant WordPress usage and e-commerce or restaurant delivery sectors are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:12:31 UTC

Technical Analysis

CVE-2024-12920 is a critical authorization bypass vulnerability categorized under CWE-862 (Missing Authorization) in the FoodBakery Delivery Restaurant Directory WordPress Theme developed by Chimpstudio. The vulnerability affects all versions up to and including 4.7. It arises because several theme functions—namely foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all—lack proper capability checks. This flaw enables any authenticated user with at least Subscriber-level privileges to perform unauthorized operations such as deleting arbitrary files on the server, modifying theme options, exporting and importing widget configurations, generating and restoring backups, and resetting theme options. Exploitation requires no user interaction and can be performed remotely over the network, increasing the attack surface. The vulnerability has a CVSS v3.1 base score of 8.8, reflecting its high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation combined with the broad scope of affected functions makes this a significant threat to WordPress sites using this theme, especially those with multiple user roles and lower privilege accounts. The absence of patches at the time of reporting further exacerbates the risk.

Potential Impact

The impact of CVE-2024-12920 is substantial for organizations using the FoodBakery WordPress theme. Attackers with minimal privileges can escalate their influence by deleting critical files, potentially causing denial of service or site downtime. Unauthorized modification of theme options and widget settings can lead to website defacement, loss of business continuity, or insertion of malicious content. The ability to generate and restore backups without authorization could allow attackers to revert security configurations or inject malicious backups, complicating recovery efforts. Confidential data stored or displayed by the theme could be exposed or altered, undermining user trust and regulatory compliance. The vulnerability threatens the availability, integrity, and confidentiality of affected websites, which can result in financial losses, reputational damage, and legal consequences. Given the widespread use of WordPress and the popularity of restaurant directory themes, the threat has a broad potential impact globally.

Mitigation Recommendations

To mitigate CVE-2024-12920, organizations should immediately audit user roles and restrict Subscriber-level or higher access to trusted users only, minimizing exposure. Disable or limit the use of vulnerable theme functions where possible until a patch is released. Implement strict monitoring and logging of theme option changes, file deletions, and backup operations to detect suspicious activities early. Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized requests targeting the vulnerable functions. Regularly back up website data and store backups offline to prevent tampering. Engage with the theme vendor or community to obtain or develop patches and apply them promptly once available. Consider isolating the WordPress environment and applying the principle of least privilege to all user accounts. Additionally, conduct penetration testing focused on authorization controls to identify and remediate similar weaknesses in other plugins or themes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-24T23:33:46.746Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e4bb7ef31ef0b59c71e

Added to database: 2/25/2026, 9:48:59 PM

Last enriched: 2/26/2026, 2:12:31 AM

Last updated: 2/26/2026, 8:22:22 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats