Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13653: CWE-862 Missing Authorization in MVPThemes ZoxPress - The All-In-One WordPress News Theme

0
High
VulnerabilityCVE-2024-13653cvecve-2024-13653cwe-862
Published: Wed Feb 12 2025 (02/12/2025, 04:22:15 UTC)
Source: CVE Database V5
Vendor/Project: MVPThemes
Product: ZoxPress - The All-In-One WordPress News Theme

Description

CVE-2024-13653 is a high-severity vulnerability in the ZoxPress WordPress theme that allows authenticated users with Subscriber-level access or higher to perform unauthorized modifications due to a missing authorization check. Exploiting this flaw, attackers can update arbitrary site options, including changing the default user role to administrator and enabling user registration, thereby escalating their privileges to full administrative control without requiring user interaction. This vulnerability affects all versions up to and including 2. 12. 0 of the theme. The flaw stems from the 'backup_options' function lacking proper capability verification, enabling privilege escalation on vulnerable WordPress sites. No known public exploits are reported yet, but the ease of exploitation and potential impact make it critical for site administrators to apply mitigations promptly. Organizations using this theme should prioritize patching or implementing access restrictions to prevent unauthorized option changes. Countries with significant WordPress usage and high adoption of this theme are at elevated risk, especially where WordPress powers critical news or media websites.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:57:10 UTC

Technical Analysis

CVE-2024-13653 is a vulnerability classified under CWE-862 (Missing Authorization) found in the ZoxPress - The All-In-One WordPress News Theme developed by MVPThemes. The issue arises from the 'backup_options' function, which lacks a proper capability check, allowing authenticated users with as low as Subscriber-level privileges to modify arbitrary WordPress options. This missing authorization enables attackers to escalate privileges by changing the default registration role to administrator and enabling user registration, thereby creating new administrative accounts without requiring higher privileges or user interaction. The vulnerability affects all versions up to and including 2.12.0 of the theme. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. Although no known exploits are currently in the wild, the vulnerability's nature makes it a critical risk for WordPress sites using this theme, especially news and media sites relying on ZoxPress. The flaw allows attackers to gain full control over the site, potentially leading to data breaches, defacement, or further compromise of connected systems. The vulnerability was publicly disclosed in February 2025, with no official patch available at the time, emphasizing the need for immediate mitigation.

Potential Impact

The impact of CVE-2024-13653 is severe for organizations running WordPress sites with the ZoxPress theme. Attackers with minimal authenticated access can escalate privileges to administrator level, effectively gaining full control over the website. This can lead to unauthorized data modification, site defacement, insertion of malicious code, theft of sensitive information, and disruption of service. For news and media organizations, this could result in reputational damage, loss of user trust, and potential regulatory consequences if user data is compromised. The ability to create new admin accounts also facilitates persistent access and lateral movement within the hosting environment. Given WordPress's widespread use globally, especially in content management for news outlets, the vulnerability poses a significant risk to the integrity and availability of critical information platforms. The lack of required user interaction and low complexity of exploitation further increase the likelihood of successful attacks.

Mitigation Recommendations

To mitigate CVE-2024-13653, organizations should immediately restrict access to the WordPress admin area to trusted users only, ensuring that Subscriber-level users are carefully managed or temporarily disabled if not necessary. Until an official patch is released, consider disabling user registration and setting the default role to a non-privileged level manually via the WordPress settings. Implement web application firewall (WAF) rules to detect and block unauthorized attempts to invoke the 'backup_options' function or modify site options. Regularly audit user roles and permissions to detect any unauthorized changes. Monitoring logs for unusual option updates or new administrator accounts can provide early warning of exploitation attempts. Additionally, consider isolating the WordPress environment and applying principle of least privilege to database and file system access. Once a patch becomes available from MVPThemes, apply it promptly. Backup site data regularly to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T16:16:45.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e65b7ef31ef0b59fee6

Added to database: 2/25/2026, 9:49:25 PM

Last enriched: 2/25/2026, 10:57:10 PM

Last updated: 2/26/2026, 6:46:58 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats