Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13375: CWE-620 Unverified Password Change in spoonthemes Adifier System

0
Critical
VulnerabilityCVE-2024-13375cvecve-2024-13375cwe-620
Published: Sat Jan 18 2025 (01/18/2025, 08:26:39 UTC)
Source: CVE Database V5
Vendor/Project: spoonthemes
Product: Adifier System

Description

CVE-2024-13375 is a critical vulnerability in the spoonthemes Adifier System WordPress plugin (up to version 3. 1. 7) that allows unauthenticated attackers to change arbitrary user passwords, including administrators, via the adifier_recover() function. This occurs because the plugin fails to properly verify user identity before allowing password updates, enabling privilege escalation and account takeover. The vulnerability has a CVSS score of 9. 8, indicating a high impact on confidentiality, integrity, and availability without requiring authentication or user interaction. Although no known exploits are currently in the wild, the ease of exploitation and severity make it a significant threat to WordPress sites using this plugin. Organizations should urgently apply patches or implement mitigations to prevent unauthorized access and potential full site compromise. Countries with large WordPress user bases and significant online business presence are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:12:18 UTC

Technical Analysis

CVE-2024-13375 is a critical security vulnerability identified in the spoonthemes Adifier System plugin for WordPress, affecting all versions up to and including 3.1.7. The root cause is an improper validation of user identity within the adifier_recover() function, which handles password recovery and updates. Specifically, the plugin does not verify that the password change request originates from the legitimate user, allowing unauthenticated attackers to arbitrarily reset passwords for any user account, including those with administrative privileges. This flaw constitutes a CWE-620 (Unverified Password Change) vulnerability. Exploiting this vulnerability requires no authentication or user interaction, and the attack vector is network-based (remote). The CVSS v3.1 base score is 9.8 (critical), reflecting the high impact on confidentiality, integrity, and availability of affected systems. Successful exploitation results in full account takeover, enabling attackers to gain administrative control over the WordPress site, potentially leading to data theft, site defacement, malware deployment, or further lateral movement within the hosting environment. No official patches or fixes were listed at the time of publication, and no known exploits have been reported in the wild, but the vulnerability's nature and severity make it a prime target for attackers. The plugin's widespread use in classified ads and marketplace websites built on WordPress increases the potential attack surface.

Potential Impact

The impact of CVE-2024-13375 is severe for organizations using the spoonthemes Adifier System plugin. An attacker can gain unauthorized administrative access to WordPress sites, leading to complete compromise of the website and potentially the underlying server environment. This can result in data breaches, defacement, injection of malicious code (such as backdoors or ransomware), disruption of business operations, and loss of customer trust. Since WordPress powers a significant portion of the web, especially small to medium businesses and niche marketplaces, the vulnerability could facilitate widespread attacks. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the risk of automated mass attacks. Organizations relying on this plugin for critical online services face risks to confidentiality, integrity, and availability, with potential regulatory and reputational consequences.

Mitigation Recommendations

To mitigate CVE-2024-13375, organizations should immediately upgrade the spoonthemes Adifier System plugin to a patched version once available. Until a patch is released, implement the following specific measures: 1) Disable or restrict access to the adifier_recover() function by applying web application firewall (WAF) rules to block unauthenticated requests targeting password recovery endpoints; 2) Restrict password reset functionality to authenticated users only, if feasible, by customizing plugin code or using WordPress hooks to add verification steps; 3) Monitor logs for unusual password reset attempts or changes, especially targeting administrator accounts; 4) Enforce strong multi-factor authentication (MFA) on all administrator accounts to reduce the impact of potential account takeovers; 5) Conduct regular backups and ensure rapid restoration capabilities; 6) Isolate WordPress hosting environments to limit lateral movement in case of compromise; 7) Engage in proactive threat hunting for indicators of compromise related to this vulnerability. These targeted steps go beyond generic advice by focusing on the specific vulnerable function and attack vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-13T21:09:37.877Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e52b7ef31ef0b59e3e6

Added to database: 2/25/2026, 9:49:06 PM

Last enriched: 2/26/2026, 1:12:18 AM

Last updated: 2/26/2026, 6:15:13 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats