Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13520: CWE-862 Missing Authorization in codemenschen Gift Cards (Gift Vouchers and Packages) (WooCommerce Supported)

0
Medium
VulnerabilityCVE-2024-13520cvecve-2024-13520cwe-862
Published: Thu Feb 20 2025 (02/20/2025, 09:21:36 UTC)
Source: CVE Database V5
Vendor/Project: codemenschen
Product: Gift Cards (Gift Vouchers and Packages) (WooCommerce Supported)

Description

CVE-2024-13520 is a medium severity vulnerability in the WordPress plugin 'Gift Cards (Gift Vouchers and Packages) (WooCommerce Supported)' by codemenschen. It involves missing authorization checks on key functions that allow unauthenticated attackers to modify gift voucher data such as value, expiration date, and user notes. This flaw affects all versions up to and including 4. 4. 6. Exploitation requires no authentication or user interaction and can lead to unauthorized data modification, potentially causing financial loss or abuse of gift vouchers. No known exploits are currently reported in the wild. Organizations using this plugin should urgently review and update their installations once a patch is available or implement compensating controls to restrict access to vulnerable endpoints. The vulnerability impacts WooCommerce-based e-commerce sites globally, with higher risk in countries with widespread WordPress and WooCommerce adoption. The CVSS score is 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:16:40 UTC

Technical Analysis

The vulnerability identified as CVE-2024-13520 affects the WordPress plugin 'Gift Cards (Gift Vouchers and Packages) (WooCommerce Supported)' developed by codemenschen. The core issue is a missing authorization (CWE-862) in the plugin's functions 'update_voucher_price', 'update_voucher_date', and 'update_voucher_note'. These functions lack proper capability checks, allowing unauthenticated attackers to invoke them and modify gift voucher attributes such as the monetary value, expiration date, and user notes. This flaw exists in all plugin versions up to and including 4.4.6. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely by any attacker with network access to the WordPress site hosting the plugin. The impact is primarily on data integrity, as attackers can alter voucher details, potentially enabling fraudulent use or financial loss. There is no direct impact on confidentiality or availability. No patches or updates are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability is tracked with a CVSS v3.1 base score of 5.3, indicating medium severity. The affected plugin is commonly used in WooCommerce-powered e-commerce websites to manage gift cards and vouchers, making the vulnerability relevant to online retailers using this plugin. The missing authorization check represents a critical lapse in access control design, emphasizing the need for strict capability verification in all sensitive operations within plugins.

Potential Impact

The primary impact of CVE-2024-13520 is unauthorized modification of gift voucher data, which can lead to financial fraud, loss of revenue, and customer trust erosion for e-commerce businesses using the affected plugin. Attackers can increase voucher values, extend expiration dates, or alter notes to facilitate fraudulent transactions or abuse promotional campaigns. This undermines the integrity of the voucher system and can cause accounting discrepancies. While the vulnerability does not directly compromise confidentiality or availability, the financial and reputational damage can be significant, especially for businesses relying heavily on gift card sales. The ease of exploitation without authentication increases the risk of widespread abuse. Organizations may face increased chargebacks, customer complaints, and potential regulatory scrutiny if fraudulent transactions occur. Additionally, attackers could use this vulnerability as a foothold to probe for other weaknesses in the WordPress environment. The lack of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a significant risk until remediated.

Mitigation Recommendations

1. Immediate mitigation involves restricting access to the vulnerable plugin endpoints by implementing web application firewall (WAF) rules that block unauthenticated requests targeting the 'update_voucher_price', 'update_voucher_date', and 'update_voucher_note' functions. 2. Monitor web server and application logs for suspicious requests attempting to invoke these functions without authentication. 3. Disable or uninstall the affected plugin if gift card functionality is not critical or can be temporarily suspended. 4. Follow the vendor's updates closely and apply patches as soon as they become available. 5. Implement strict role-based access controls (RBAC) and capability checks in custom plugin code or through WordPress hooks to enforce authorization on sensitive operations. 6. Conduct regular security audits of all WordPress plugins to identify missing authorization or other access control issues. 7. Educate site administrators about the risks of running outdated plugins and the importance of timely updates. 8. Consider isolating e-commerce environments and limiting network exposure to reduce attack surface. 9. Use multi-factor authentication (MFA) for administrative access to reduce risk of broader compromise, although this does not directly prevent this unauthenticated vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-17T18:51:52.140Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5cb7ef31ef0b59ef34

Added to database: 2/25/2026, 9:49:16 PM

Last enriched: 2/26/2026, 12:16:40 AM

Last updated: 2/26/2026, 6:39:01 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats