CVE-2024-13724: CWE-285 Improper Authorization in wpswings Wallet System for WooCommerce
CVE-2024-13724 is a medium severity improper authorization vulnerability in the Wallet System for WooCommerce plugin by wpswings, affecting all versions up to 2. 6. 2. It allows unauthenticated attackers to manipulate wallet balances by increasing their own balance, transferring funds between arbitrary users, and initiating transfers from other users' wallets. The vulnerability stems from insufficient access control checks on critical wallet operations. Exploitation does not require user interaction but does require low privileges, making it accessible to authenticated users with limited permissions. There are no known exploits in the wild currently. The vulnerability impacts the integrity of wallet balances but does not affect confidentiality or availability. Organizations using this plugin on WordPress e-commerce sites are at risk of financial fraud and loss. Mitigation involves applying patches when available, restricting plugin access, and monitoring wallet transactions for anomalies.
AI Analysis
Technical Summary
CVE-2024-13724 is an improper authorization vulnerability (CWE-285) found in the Wallet System for WooCommerce plugin developed by wpswings. This plugin provides wallet, cashback, refund, partial payment, and wallet restriction functionalities for WooCommerce on WordPress. The vulnerability affects all versions up to and including 2.6.2. It allows unauthorized users, including unauthenticated attackers, to perform critical wallet operations without proper permission checks. Specifically, attackers can increase their own wallet balance arbitrarily, transfer balances between any users, and initiate transfer requests from other users' wallets. The root cause is the lack of adequate authorization enforcement on wallet-related functions, enabling attackers to bypass intended access controls. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting integrity (I:L) but not confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability threatens the financial integrity of e-commerce platforms using this plugin, potentially leading to fraudulent wallet balance manipulations and unauthorized fund transfers.
Potential Impact
The primary impact of CVE-2024-13724 is on the integrity of wallet balances within WooCommerce stores using the vulnerable plugin. Attackers can fraudulently increase their wallet funds, transfer funds between users without authorization, and initiate unauthorized transfer requests, leading to financial losses for merchants and customers. This undermines trust in the e-commerce platform and can result in chargebacks, reputational damage, and operational disruptions. While confidentiality and availability are not directly affected, the financial integrity breach can have cascading effects on business operations and customer confidence. Organizations relying on this plugin for wallet management face risks of internal fraud and external attacks, especially if attacker accounts with low privileges exist or if the site allows unauthenticated access to vulnerable functions. The lack of known exploits in the wild suggests limited current exploitation, but the ease of exploitation and significant financial impact make it a critical concern for affected sites.
Mitigation Recommendations
1. Immediately restrict access to the Wallet System for WooCommerce plugin functionalities by limiting user roles and permissions to trusted administrators only. 2. Monitor wallet transactions and transfer logs for unusual activity such as unexpected balance increases or transfers between unrelated accounts. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting wallet operations. 4. Disable or remove the Wallet System for WooCommerce plugin if it is not essential to business operations until a security patch is released. 5. Regularly check for updates from the vendor (wpswings) and apply security patches promptly once available. 6. Conduct thorough security audits and penetration testing focused on authorization controls in the WooCommerce environment. 7. Educate site administrators about the risks of improper authorization and the importance of strict access controls. 8. Consider implementing multi-factor authentication (MFA) for administrative accounts to reduce the risk of account compromise. 9. Backup wallet data frequently to enable recovery in case of fraudulent transactions. 10. Review and harden WordPress and WooCommerce security configurations to minimize attack surface.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, Brazil, France, Netherlands, Italy
CVE-2024-13724: CWE-285 Improper Authorization in wpswings Wallet System for WooCommerce
Description
CVE-2024-13724 is a medium severity improper authorization vulnerability in the Wallet System for WooCommerce plugin by wpswings, affecting all versions up to 2. 6. 2. It allows unauthenticated attackers to manipulate wallet balances by increasing their own balance, transferring funds between arbitrary users, and initiating transfers from other users' wallets. The vulnerability stems from insufficient access control checks on critical wallet operations. Exploitation does not require user interaction but does require low privileges, making it accessible to authenticated users with limited permissions. There are no known exploits in the wild currently. The vulnerability impacts the integrity of wallet balances but does not affect confidentiality or availability. Organizations using this plugin on WordPress e-commerce sites are at risk of financial fraud and loss. Mitigation involves applying patches when available, restricting plugin access, and monitoring wallet transactions for anomalies.
AI-Powered Analysis
Technical Analysis
CVE-2024-13724 is an improper authorization vulnerability (CWE-285) found in the Wallet System for WooCommerce plugin developed by wpswings. This plugin provides wallet, cashback, refund, partial payment, and wallet restriction functionalities for WooCommerce on WordPress. The vulnerability affects all versions up to and including 2.6.2. It allows unauthorized users, including unauthenticated attackers, to perform critical wallet operations without proper permission checks. Specifically, attackers can increase their own wallet balance arbitrarily, transfer balances between any users, and initiate transfer requests from other users' wallets. The root cause is the lack of adequate authorization enforcement on wallet-related functions, enabling attackers to bypass intended access controls. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting integrity (I:L) but not confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability threatens the financial integrity of e-commerce platforms using this plugin, potentially leading to fraudulent wallet balance manipulations and unauthorized fund transfers.
Potential Impact
The primary impact of CVE-2024-13724 is on the integrity of wallet balances within WooCommerce stores using the vulnerable plugin. Attackers can fraudulently increase their wallet funds, transfer funds between users without authorization, and initiate unauthorized transfer requests, leading to financial losses for merchants and customers. This undermines trust in the e-commerce platform and can result in chargebacks, reputational damage, and operational disruptions. While confidentiality and availability are not directly affected, the financial integrity breach can have cascading effects on business operations and customer confidence. Organizations relying on this plugin for wallet management face risks of internal fraud and external attacks, especially if attacker accounts with low privileges exist or if the site allows unauthenticated access to vulnerable functions. The lack of known exploits in the wild suggests limited current exploitation, but the ease of exploitation and significant financial impact make it a critical concern for affected sites.
Mitigation Recommendations
1. Immediately restrict access to the Wallet System for WooCommerce plugin functionalities by limiting user roles and permissions to trusted administrators only. 2. Monitor wallet transactions and transfer logs for unusual activity such as unexpected balance increases or transfers between unrelated accounts. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting wallet operations. 4. Disable or remove the Wallet System for WooCommerce plugin if it is not essential to business operations until a security patch is released. 5. Regularly check for updates from the vendor (wpswings) and apply security patches promptly once available. 6. Conduct thorough security audits and penetration testing focused on authorization controls in the WooCommerce environment. 7. Educate site administrators about the risks of improper authorization and the importance of strict access controls. 8. Consider implementing multi-factor authentication (MFA) for administrative accounts to reduce the risk of account compromise. 9. Backup wallet data frequently to enable recovery in case of fraudulent transactions. 10. Review and harden WordPress and WooCommerce security configurations to minimize attack surface.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-24T18:37:03.630Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e6ab7ef31ef0b5a0450
Added to database: 2/25/2026, 9:49:30 PM
Last enriched: 2/25/2026, 10:29:22 PM
Last updated: 2/26/2026, 7:21:44 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.