Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13307: CWE-862 Missing Authorization in pixel_prime Reales WP - Real Estate WordPress Theme

0
Medium
VulnerabilityCVE-2024-13307cvecve-2024-13307cwe-862
Published: Thu Apr 24 2025 (04/24/2025, 08:23:51 UTC)
Source: CVE
Vendor/Project: pixel_prime
Product: Reales WP - Real Estate WordPress Theme

Description

The Reales WP - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the 'reales_delete_file', 'reales_delete_file_plans', 'reales_add_to_favourites', and 'reales_remove_from_favourites' functions in all versions up to, and including, 2.1.2. This makes it possible for unauthenticated attackers to delete arbitrary attachments, and add or remove favorite property listings for any user.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:53:11 UTC

Technical Analysis

CVE-2024-13307 affects the Reales WP - Real Estate WordPress Theme developed by pixel_prime, specifically all versions up to and including 2.1.2. The vulnerability arises due to missing authorization checks (CWE-862) in several critical functions: 'reales_delete_file', 'reales_delete_file_plans', 'reales_add_to_favourites', and 'reales_remove_from_favourites'. These functions are responsible for deleting attachments and managing users' favorite property listings. Because the theme fails to verify whether the requester has the necessary permissions before executing these actions, unauthenticated attackers can exploit this flaw to delete arbitrary attachments from the site and alter favorite listings for any user. This unauthorized modification can lead to data loss and manipulation of user preferences, undermining the integrity of the affected website's data. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. However, it does not allow attackers to access confidential information or disrupt site availability. No patches have been officially released at the time of this report, and no known exploits have been observed in the wild. The CVSS v3.1 base score is 5.3, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N. The issue was reserved by Wordfence and enriched by CISA, highlighting its recognition by security authorities.

Potential Impact

The primary impact of CVE-2024-13307 is unauthorized modification of website data, specifically the deletion of attachments and manipulation of user favorite listings. For organizations using the Reales WP theme, this can result in loss of critical media files, disruption of user experience, and potential reputational damage due to data tampering. Although confidentiality and availability are not directly affected, the integrity breach can undermine trust in the website and its data. Real estate websites rely heavily on accurate listings and media attachments; unauthorized deletions or changes can cause operational disruptions and user dissatisfaction. Attackers could exploit this vulnerability to remove marketing images, property photos, or other attachments, impacting business operations. The lack of authentication requirement and ease of exploitation increase the risk of automated attacks or mass exploitation attempts. While no exploits are currently known in the wild, the vulnerability's presence in a popular WordPress theme makes it a likely target for attackers seeking to deface or disrupt real estate websites globally.

Mitigation Recommendations

1. Immediately update the Reales WP theme to a patched version once available from the vendor. Monitor vendor channels for official patches. 2. Until a patch is released, implement strict web application firewall (WAF) rules to block unauthorized requests targeting the vulnerable functions, especially those attempting to invoke 'reales_delete_file' and related endpoints. 3. Restrict access to administrative and theme-related endpoints by IP whitelisting or VPN access to reduce exposure. 4. Conduct a thorough audit of attachments and user favorites to detect any unauthorized changes or deletions. 5. Employ WordPress security plugins that enforce capability checks and monitor for suspicious activity. 6. Regularly back up website data, including attachments and user settings, to enable recovery from unauthorized deletions. 7. Educate site administrators on the risks of using outdated themes and the importance of timely updates. 8. Review and harden WordPress user roles and permissions to minimize potential damage from compromised accounts. These measures go beyond generic advice by focusing on immediate protective controls and operational readiness until vendor patches are available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-09T20:07:48.886Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1566

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 2/28/2026, 11:53:11 AM

Last updated: 3/24/2026, 11:57:52 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses