Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13737: CWE-862 Missing Authorization in stylemix Motors – Car Dealership & Classified Listings Plugin

0
Medium
VulnerabilityCVE-2024-13737cvecve-2024-13737cwe-862
Published: Sat Mar 22 2025 (03/22/2025, 02:22:10 UTC)
Source: CVE Database V5
Vendor/Project: stylemix
Product: Motors – Car Dealership & Classified Listings Plugin

Description

CVE-2024-13737 is a medium severity vulnerability in the Motors – Car Dealership & Classified Listings WordPress plugin by stylemix. It involves missing authorization checks in the motors_create_template and motors_delete_template functions, allowing authenticated users with Subscriber-level access or higher to create or delete listing templates arbitrarily. Exploitation requires the Elementor plugin, which is a dependency for the Motors Starter Theme. The vulnerability does not impact confidentiality or availability but allows unauthorized modification of listing templates, potentially disrupting site content integrity. No known exploits are currently reported in the wild. The CVSS score is 4. 3, reflecting low complexity and no user interaction needed. Organizations using this plugin, especially those relying on the Motors Starter Theme with Elementor, should prioritize patching or applying mitigations to prevent unauthorized content manipulation.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:16:56 UTC

Technical Analysis

CVE-2024-13737 is a vulnerability classified under CWE-862 (Missing Authorization) affecting all versions up to and including 1.4.57 of the Motors – Car Dealership & Classified Listings plugin for WordPress, developed by stylemix. The root cause is the absence of proper capability checks in two critical functions: motors_create_template and motors_delete_template. These functions handle the creation and deletion of listing templates within the plugin. Because of this missing authorization, any authenticated user with at least Subscriber-level privileges can invoke these functions to create arbitrary listing templates or delete existing posts without proper permissions. The exploitation path requires the Elementor plugin to be installed, as it is a prerequisite for the Motors Starter Theme, which integrates with the vulnerable plugin. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The impact is limited to integrity, as attackers can modify or delete content but cannot affect confidentiality or availability. No patches are currently linked, and no known exploits have been observed in the wild. The vulnerability was published on March 22, 2025, and assigned a CVSS v3.1 base score of 4.3, indicating medium severity. This vulnerability highlights the importance of enforcing strict authorization checks even for lower-privileged authenticated users in WordPress plugins that manage content.

Potential Impact

The primary impact of CVE-2024-13737 is unauthorized modification of website content, specifically the creation and deletion of listing templates and posts within the Motors plugin environment. For organizations running car dealership or classified listing websites using this plugin, attackers with Subscriber-level access can manipulate listings, potentially leading to misinformation, defacement, or disruption of business operations. While the vulnerability does not directly compromise sensitive data confidentiality or cause denial of service, the integrity loss can damage brand reputation and user trust. Attackers could also use this capability to remove legitimate listings or inject fraudulent ones, affecting customer experience and revenue. Since the vulnerability requires authentication but only minimal privileges, it broadens the threat surface to include any registered user, including those with minimal trust. The dependency on the Elementor plugin and Motors Starter Theme means that organizations using these combined components are at risk. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially as the vulnerability becomes publicly known.

Mitigation Recommendations

To mitigate CVE-2024-13737, organizations should first verify if they are using the Motors – Car Dealership & Classified Listings plugin version 1.4.57 or earlier in conjunction with the Elementor plugin and Motors Starter Theme. Immediate mitigation steps include restricting user roles and permissions to minimize the number of users with Subscriber-level or higher access, especially on publicly accessible sites. Administrators should audit existing user accounts for unnecessary privileges and remove or downgrade them accordingly. Until an official patch is released, consider disabling or limiting the use of the affected functions via custom code or security plugins that enforce capability checks on motors_create_template and motors_delete_template calls. Monitoring and logging plugin activity related to template creation and deletion can help detect exploitation attempts. Additionally, implementing a Web Application Firewall (WAF) with rules targeting unauthorized access patterns to these functions can provide a protective layer. Regularly check for updates from stylemix and apply patches promptly once available. Finally, educate site administrators and users about the risks of granting excessive permissions and the importance of plugin security hygiene.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-26T17:34:42.653Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e6cb7ef31ef0b5a055d

Added to database: 2/25/2026, 9:49:32 PM

Last enriched: 2/25/2026, 10:16:56 PM

Last updated: 2/26/2026, 8:32:13 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats