CVE-2024-13307: CWE-862 Missing Authorization in pixel_prime Reales WP - Real Estate WordPress Theme
The Reales WP - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the 'reales_delete_file', 'reales_delete_file_plans', 'reales_add_to_favourites', and 'reales_remove_from_favourites' functions in all versions up to, and including, 2.1.2. This makes it possible for unauthenticated attackers to delete arbitrary attachments, and add or remove favorite property listings for any user.
AI Analysis
Technical Summary
CVE-2024-13307 affects the Reales WP - Real Estate WordPress Theme developed by pixel_prime, specifically all versions up to and including 2.1.2. The vulnerability arises due to missing authorization checks (CWE-862) in several critical functions: 'reales_delete_file', 'reales_delete_file_plans', 'reales_add_to_favourites', and 'reales_remove_from_favourites'. These functions are responsible for deleting attachments and managing users' favorite property listings. Because the theme fails to verify whether the requester has the necessary permissions before executing these actions, unauthenticated attackers can exploit this flaw to delete arbitrary attachments from the site and alter favorite listings for any user. This unauthorized modification can lead to data loss and manipulation of user preferences, undermining the integrity of the affected website's data. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. However, it does not allow attackers to access confidential information or disrupt site availability. No patches have been officially released at the time of this report, and no known exploits have been observed in the wild. The CVSS v3.1 base score is 5.3, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N. The issue was reserved by Wordfence and enriched by CISA, highlighting its recognition by security authorities.
Potential Impact
The primary impact of CVE-2024-13307 is unauthorized modification of website data, specifically the deletion of attachments and manipulation of user favorite listings. For organizations using the Reales WP theme, this can result in loss of critical media files, disruption of user experience, and potential reputational damage due to data tampering. Although confidentiality and availability are not directly affected, the integrity breach can undermine trust in the website and its data. Real estate websites rely heavily on accurate listings and media attachments; unauthorized deletions or changes can cause operational disruptions and user dissatisfaction. Attackers could exploit this vulnerability to remove marketing images, property photos, or other attachments, impacting business operations. The lack of authentication requirement and ease of exploitation increase the risk of automated attacks or mass exploitation attempts. While no exploits are currently known in the wild, the vulnerability's presence in a popular WordPress theme makes it a likely target for attackers seeking to deface or disrupt real estate websites globally.
Mitigation Recommendations
1. Immediately update the Reales WP theme to a patched version once available from the vendor. Monitor vendor channels for official patches. 2. Until a patch is released, implement strict web application firewall (WAF) rules to block unauthorized requests targeting the vulnerable functions, especially those attempting to invoke 'reales_delete_file' and related endpoints. 3. Restrict access to administrative and theme-related endpoints by IP whitelisting or VPN access to reduce exposure. 4. Conduct a thorough audit of attachments and user favorites to detect any unauthorized changes or deletions. 5. Employ WordPress security plugins that enforce capability checks and monitor for suspicious activity. 6. Regularly back up website data, including attachments and user settings, to enable recovery from unauthorized deletions. 7. Educate site administrators on the risks of using outdated themes and the importance of timely updates. 8. Review and harden WordPress user roles and permissions to minimize potential damage from compromised accounts. These measures go beyond generic advice by focusing on immediate protective controls and operational readiness until vendor patches are available.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, South Africa, Netherlands, Spain
CVE-2024-13307: CWE-862 Missing Authorization in pixel_prime Reales WP - Real Estate WordPress Theme
Description
The Reales WP - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the 'reales_delete_file', 'reales_delete_file_plans', 'reales_add_to_favourites', and 'reales_remove_from_favourites' functions in all versions up to, and including, 2.1.2. This makes it possible for unauthenticated attackers to delete arbitrary attachments, and add or remove favorite property listings for any user.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-13307 affects the Reales WP - Real Estate WordPress Theme developed by pixel_prime, specifically all versions up to and including 2.1.2. The vulnerability arises due to missing authorization checks (CWE-862) in several critical functions: 'reales_delete_file', 'reales_delete_file_plans', 'reales_add_to_favourites', and 'reales_remove_from_favourites'. These functions are responsible for deleting attachments and managing users' favorite property listings. Because the theme fails to verify whether the requester has the necessary permissions before executing these actions, unauthenticated attackers can exploit this flaw to delete arbitrary attachments from the site and alter favorite listings for any user. This unauthorized modification can lead to data loss and manipulation of user preferences, undermining the integrity of the affected website's data. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. However, it does not allow attackers to access confidential information or disrupt site availability. No patches have been officially released at the time of this report, and no known exploits have been observed in the wild. The CVSS v3.1 base score is 5.3, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N. The issue was reserved by Wordfence and enriched by CISA, highlighting its recognition by security authorities.
Potential Impact
The primary impact of CVE-2024-13307 is unauthorized modification of website data, specifically the deletion of attachments and manipulation of user favorite listings. For organizations using the Reales WP theme, this can result in loss of critical media files, disruption of user experience, and potential reputational damage due to data tampering. Although confidentiality and availability are not directly affected, the integrity breach can undermine trust in the website and its data. Real estate websites rely heavily on accurate listings and media attachments; unauthorized deletions or changes can cause operational disruptions and user dissatisfaction. Attackers could exploit this vulnerability to remove marketing images, property photos, or other attachments, impacting business operations. The lack of authentication requirement and ease of exploitation increase the risk of automated attacks or mass exploitation attempts. While no exploits are currently known in the wild, the vulnerability's presence in a popular WordPress theme makes it a likely target for attackers seeking to deface or disrupt real estate websites globally.
Mitigation Recommendations
1. Immediately update the Reales WP theme to a patched version once available from the vendor. Monitor vendor channels for official patches. 2. Until a patch is released, implement strict web application firewall (WAF) rules to block unauthorized requests targeting the vulnerable functions, especially those attempting to invoke 'reales_delete_file' and related endpoints. 3. Restrict access to administrative and theme-related endpoints by IP whitelisting or VPN access to reduce exposure. 4. Conduct a thorough audit of attachments and user favorites to detect any unauthorized changes or deletions. 5. Employ WordPress security plugins that enforce capability checks and monitor for suspicious activity. 6. Regularly back up website data, including attachments and user settings, to enable recovery from unauthorized deletions. 7. Educate site administrators on the risks of using outdated themes and the importance of timely updates. 8. Review and harden WordPress user roles and permissions to minimize potential damage from compromised accounts. These measures go beyond generic advice by focusing on immediate protective controls and operational readiness until vendor patches are available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-09T20:07:48.886Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf1566
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 2/28/2026, 11:53:11 AM
Last updated: 3/24/2026, 11:57:52 PM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.