CVE-2024-12920: CWE-862 Missing Authorization in Chimpstudio FoodBakery | Delivery Restaurant Directory WordPress Theme
CVE-2024-12920 is a high-severity vulnerability affecting all versions of the FoodBakery Delivery Restaurant Directory WordPress Theme by Chimpstudio. It stems from missing authorization checks in multiple theme functions, allowing authenticated users with Subscriber-level access or higher to perform unauthorized actions. These actions include deleting arbitrary files, modifying theme options, exporting and importing widget settings, generating and restoring backups, and resetting theme options. The vulnerability does not require user interaction and can be exploited remotely over the network. Although no known exploits are currently reported in the wild, the impact on confidentiality, integrity, and availability is severe. Organizations using this theme on WordPress sites are at risk of data loss, site defacement, or persistent unauthorized configuration changes. Immediate mitigation involves restricting user roles, monitoring for suspicious activity, and applying patches once available. Countries with significant WordPress usage and e-commerce or restaurant delivery sectors are most at risk.
AI Analysis
Technical Summary
CVE-2024-12920 is a critical authorization bypass vulnerability categorized under CWE-862 (Missing Authorization) in the FoodBakery Delivery Restaurant Directory WordPress Theme developed by Chimpstudio. The vulnerability affects all versions up to and including 4.7. It arises because several theme functions—namely foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all—lack proper capability checks. This flaw enables any authenticated user with at least Subscriber-level privileges to perform unauthorized operations such as deleting arbitrary files on the server, modifying theme options, exporting and importing widget configurations, generating and restoring backups, and resetting theme options. Exploitation requires no user interaction and can be performed remotely over the network, increasing the attack surface. The vulnerability has a CVSS v3.1 base score of 8.8, reflecting its high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation combined with the broad scope of affected functions makes this a significant threat to WordPress sites using this theme, especially those with multiple user roles and lower privilege accounts. The absence of patches at the time of reporting further exacerbates the risk.
Potential Impact
The impact of CVE-2024-12920 is substantial for organizations using the FoodBakery WordPress theme. Attackers with minimal privileges can escalate their influence by deleting critical files, potentially causing denial of service or site downtime. Unauthorized modification of theme options and widget settings can lead to website defacement, loss of business continuity, or insertion of malicious content. The ability to generate and restore backups without authorization could allow attackers to revert security configurations or inject malicious backups, complicating recovery efforts. Confidential data stored or displayed by the theme could be exposed or altered, undermining user trust and regulatory compliance. The vulnerability threatens the availability, integrity, and confidentiality of affected websites, which can result in financial losses, reputational damage, and legal consequences. Given the widespread use of WordPress and the popularity of restaurant directory themes, the threat has a broad potential impact globally.
Mitigation Recommendations
To mitigate CVE-2024-12920, organizations should immediately audit user roles and restrict Subscriber-level or higher access to trusted users only, minimizing exposure. Disable or limit the use of vulnerable theme functions where possible until a patch is released. Implement strict monitoring and logging of theme option changes, file deletions, and backup operations to detect suspicious activities early. Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized requests targeting the vulnerable functions. Regularly back up website data and store backups offline to prevent tampering. Engage with the theme vendor or community to obtain or develop patches and apply them promptly once available. Consider isolating the WordPress environment and applying the principle of least privilege to all user accounts. Additionally, conduct penetration testing focused on authorization controls to identify and remediate similar weaknesses in other plugins or themes.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Brazil, Japan, South Korea
CVE-2024-12920: CWE-862 Missing Authorization in Chimpstudio FoodBakery | Delivery Restaurant Directory WordPress Theme
Description
CVE-2024-12920 is a high-severity vulnerability affecting all versions of the FoodBakery Delivery Restaurant Directory WordPress Theme by Chimpstudio. It stems from missing authorization checks in multiple theme functions, allowing authenticated users with Subscriber-level access or higher to perform unauthorized actions. These actions include deleting arbitrary files, modifying theme options, exporting and importing widget settings, generating and restoring backups, and resetting theme options. The vulnerability does not require user interaction and can be exploited remotely over the network. Although no known exploits are currently reported in the wild, the impact on confidentiality, integrity, and availability is severe. Organizations using this theme on WordPress sites are at risk of data loss, site defacement, or persistent unauthorized configuration changes. Immediate mitigation involves restricting user roles, monitoring for suspicious activity, and applying patches once available. Countries with significant WordPress usage and e-commerce or restaurant delivery sectors are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-12920 is a critical authorization bypass vulnerability categorized under CWE-862 (Missing Authorization) in the FoodBakery Delivery Restaurant Directory WordPress Theme developed by Chimpstudio. The vulnerability affects all versions up to and including 4.7. It arises because several theme functions—namely foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all—lack proper capability checks. This flaw enables any authenticated user with at least Subscriber-level privileges to perform unauthorized operations such as deleting arbitrary files on the server, modifying theme options, exporting and importing widget configurations, generating and restoring backups, and resetting theme options. Exploitation requires no user interaction and can be performed remotely over the network, increasing the attack surface. The vulnerability has a CVSS v3.1 base score of 8.8, reflecting its high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation combined with the broad scope of affected functions makes this a significant threat to WordPress sites using this theme, especially those with multiple user roles and lower privilege accounts. The absence of patches at the time of reporting further exacerbates the risk.
Potential Impact
The impact of CVE-2024-12920 is substantial for organizations using the FoodBakery WordPress theme. Attackers with minimal privileges can escalate their influence by deleting critical files, potentially causing denial of service or site downtime. Unauthorized modification of theme options and widget settings can lead to website defacement, loss of business continuity, or insertion of malicious content. The ability to generate and restore backups without authorization could allow attackers to revert security configurations or inject malicious backups, complicating recovery efforts. Confidential data stored or displayed by the theme could be exposed or altered, undermining user trust and regulatory compliance. The vulnerability threatens the availability, integrity, and confidentiality of affected websites, which can result in financial losses, reputational damage, and legal consequences. Given the widespread use of WordPress and the popularity of restaurant directory themes, the threat has a broad potential impact globally.
Mitigation Recommendations
To mitigate CVE-2024-12920, organizations should immediately audit user roles and restrict Subscriber-level or higher access to trusted users only, minimizing exposure. Disable or limit the use of vulnerable theme functions where possible until a patch is released. Implement strict monitoring and logging of theme option changes, file deletions, and backup operations to detect suspicious activities early. Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized requests targeting the vulnerable functions. Regularly back up website data and store backups offline to prevent tampering. Engage with the theme vendor or community to obtain or develop patches and apply them promptly once available. Consider isolating the WordPress environment and applying the principle of least privilege to all user accounts. Additionally, conduct penetration testing focused on authorization controls to identify and remediate similar weaknesses in other plugins or themes.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-24T23:33:46.746Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e4bb7ef31ef0b59c71e
Added to database: 2/25/2026, 9:48:59 PM
Last enriched: 2/26/2026, 2:12:31 AM
Last updated: 2/26/2026, 8:22:22 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.