Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13374: CWE-862 Missing Authorization in JoomUnited WP Table Manager

0
Medium
VulnerabilityCVE-2024-13374cvecve-2024-13374cwe-862
Published: Wed Feb 12 2025 (02/12/2025, 05:28:39 UTC)
Source: CVE Database V5
Vendor/Project: JoomUnited
Product: WP Table Manager

Description

CVE-2024-13374 is a medium severity vulnerability in the WP Table Manager WordPress plugin by JoomUnited, affecting all versions up to 4. 1. 3. The flaw arises from a missing authorization check on thewptm_getFolders AJAX action, allowing authenticated users with Subscriber-level privileges or higher to read arbitrary file names and directories. This vulnerability does not require user interaction and can be exploited remotely over the network. Although it does not allow modification or deletion of files, the unauthorized disclosure of directory and file names can aid attackers in reconnaissance and subsequent targeted attacks. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential information disclosure. The vulnerability primarily impacts WordPress sites globally, especially those with Subscriber-level user registrations enabled. Countries with significant WordPress usage and active web publishing communities, such as the United States, Germany, United Kingdom, Canada, Australia, and India, are more likely to be affected.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:44:49 UTC

Technical Analysis

CVE-2024-13374 is a vulnerability identified in the WP Table Manager plugin for WordPress, developed by JoomUnited. The issue stems from a missing authorization (CWE-862) on the AJAX action 'thewptm_getFolders', which is responsible for retrieving folder information. This missing capability check means that any authenticated user with at least Subscriber-level access can invoke this AJAX endpoint to enumerate arbitrary file names and directories on the server. The vulnerability affects all plugin versions up to and including 4.1.3. The attack vector is network-based and does not require user interaction, making exploitation straightforward for authenticated users. The CVSS 3.1 base score is 4.3 (medium), reflecting limited confidentiality impact without integrity or availability compromise. The flaw does not allow modification or deletion of files but leaks directory and file name information, which can facilitate further attacks such as targeted phishing, privilege escalation, or exploitation of other vulnerabilities. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is particularly concerning for WordPress sites that allow user registrations at Subscriber level or higher, as these accounts can be leveraged to extract sensitive directory structure information.

Potential Impact

The primary impact of CVE-2024-13374 is unauthorized disclosure of directory and file names within the WordPress environment hosting the WP Table Manager plugin. This information disclosure can aid attackers in mapping the file system, identifying sensitive files, configuration files, or backup data, and planning more targeted attacks such as privilege escalation, code injection, or data exfiltration. While the vulnerability does not directly allow modification or deletion of files, the reconnaissance advantage it provides can significantly increase the risk profile of affected sites. Organizations running WordPress sites with this plugin, especially those with open user registration or multiple user roles, face increased risk of information leakage. This can lead to reputational damage, data breaches, or further compromise if combined with other vulnerabilities. The vulnerability affects a broad scope of systems globally due to the widespread use of WordPress and the popularity of the WP Table Manager plugin among site administrators for managing tables within content.

Mitigation Recommendations

To mitigate CVE-2024-13374, organizations should first check for and apply any available updates or patches from JoomUnited addressing this vulnerability. If no official patch is available, administrators should consider temporarily disabling the WP Table Manager plugin or restricting access to the AJAX endpoint 'thewptm_getFolders' via web application firewall (WAF) rules or server-level access controls. Additionally, review and tighten user role permissions to limit Subscriber-level or higher access only to trusted users, reducing the attack surface. Implement monitoring and logging of AJAX requests to detect unusual access patterns to this endpoint. Employ security plugins that enforce capability checks and restrict unauthorized AJAX actions. Finally, conduct regular security audits and vulnerability scans to identify and remediate similar authorization issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-13T20:52:30.083Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e52b7ef31ef0b59e3e2

Added to database: 2/25/2026, 9:49:06 PM

Last enriched: 2/26/2026, 1:44:49 AM

Last updated: 2/26/2026, 6:11:47 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats