CVE-2024-13737: CWE-862 Missing Authorization in stylemix Motors – Car Dealership & Classified Listings Plugin
CVE-2024-13737 is a medium severity vulnerability in the Motors – Car Dealership & Classified Listings WordPress plugin by stylemix. It involves missing authorization checks in the motors_create_template and motors_delete_template functions, allowing authenticated users with Subscriber-level access or higher to create or delete listing templates arbitrarily. Exploitation requires the Elementor plugin, which is a dependency for the Motors Starter Theme. The vulnerability does not impact confidentiality or availability but allows unauthorized modification of listing templates, potentially disrupting site content integrity. No known exploits are currently reported in the wild. The CVSS score is 4. 3, reflecting low complexity and no user interaction needed. Organizations using this plugin, especially those relying on the Motors Starter Theme with Elementor, should prioritize patching or applying mitigations to prevent unauthorized content manipulation.
AI Analysis
Technical Summary
CVE-2024-13737 is a vulnerability classified under CWE-862 (Missing Authorization) affecting all versions up to and including 1.4.57 of the Motors – Car Dealership & Classified Listings plugin for WordPress, developed by stylemix. The root cause is the absence of proper capability checks in two critical functions: motors_create_template and motors_delete_template. These functions handle the creation and deletion of listing templates within the plugin. Because of this missing authorization, any authenticated user with at least Subscriber-level privileges can invoke these functions to create arbitrary listing templates or delete existing posts without proper permissions. The exploitation path requires the Elementor plugin to be installed, as it is a prerequisite for the Motors Starter Theme, which integrates with the vulnerable plugin. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The impact is limited to integrity, as attackers can modify or delete content but cannot affect confidentiality or availability. No patches are currently linked, and no known exploits have been observed in the wild. The vulnerability was published on March 22, 2025, and assigned a CVSS v3.1 base score of 4.3, indicating medium severity. This vulnerability highlights the importance of enforcing strict authorization checks even for lower-privileged authenticated users in WordPress plugins that manage content.
Potential Impact
The primary impact of CVE-2024-13737 is unauthorized modification of website content, specifically the creation and deletion of listing templates and posts within the Motors plugin environment. For organizations running car dealership or classified listing websites using this plugin, attackers with Subscriber-level access can manipulate listings, potentially leading to misinformation, defacement, or disruption of business operations. While the vulnerability does not directly compromise sensitive data confidentiality or cause denial of service, the integrity loss can damage brand reputation and user trust. Attackers could also use this capability to remove legitimate listings or inject fraudulent ones, affecting customer experience and revenue. Since the vulnerability requires authentication but only minimal privileges, it broadens the threat surface to include any registered user, including those with minimal trust. The dependency on the Elementor plugin and Motors Starter Theme means that organizations using these combined components are at risk. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially as the vulnerability becomes publicly known.
Mitigation Recommendations
To mitigate CVE-2024-13737, organizations should first verify if they are using the Motors – Car Dealership & Classified Listings plugin version 1.4.57 or earlier in conjunction with the Elementor plugin and Motors Starter Theme. Immediate mitigation steps include restricting user roles and permissions to minimize the number of users with Subscriber-level or higher access, especially on publicly accessible sites. Administrators should audit existing user accounts for unnecessary privileges and remove or downgrade them accordingly. Until an official patch is released, consider disabling or limiting the use of the affected functions via custom code or security plugins that enforce capability checks on motors_create_template and motors_delete_template calls. Monitoring and logging plugin activity related to template creation and deletion can help detect exploitation attempts. Additionally, implementing a Web Application Firewall (WAF) with rules targeting unauthorized access patterns to these functions can provide a protective layer. Regularly check for updates from stylemix and apply patches promptly once available. Finally, educate site administrators and users about the risks of granting excessive permissions and the importance of plugin security hygiene.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Brazil, Netherlands, Italy
CVE-2024-13737: CWE-862 Missing Authorization in stylemix Motors – Car Dealership & Classified Listings Plugin
Description
CVE-2024-13737 is a medium severity vulnerability in the Motors – Car Dealership & Classified Listings WordPress plugin by stylemix. It involves missing authorization checks in the motors_create_template and motors_delete_template functions, allowing authenticated users with Subscriber-level access or higher to create or delete listing templates arbitrarily. Exploitation requires the Elementor plugin, which is a dependency for the Motors Starter Theme. The vulnerability does not impact confidentiality or availability but allows unauthorized modification of listing templates, potentially disrupting site content integrity. No known exploits are currently reported in the wild. The CVSS score is 4. 3, reflecting low complexity and no user interaction needed. Organizations using this plugin, especially those relying on the Motors Starter Theme with Elementor, should prioritize patching or applying mitigations to prevent unauthorized content manipulation.
AI-Powered Analysis
Technical Analysis
CVE-2024-13737 is a vulnerability classified under CWE-862 (Missing Authorization) affecting all versions up to and including 1.4.57 of the Motors – Car Dealership & Classified Listings plugin for WordPress, developed by stylemix. The root cause is the absence of proper capability checks in two critical functions: motors_create_template and motors_delete_template. These functions handle the creation and deletion of listing templates within the plugin. Because of this missing authorization, any authenticated user with at least Subscriber-level privileges can invoke these functions to create arbitrary listing templates or delete existing posts without proper permissions. The exploitation path requires the Elementor plugin to be installed, as it is a prerequisite for the Motors Starter Theme, which integrates with the vulnerable plugin. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The impact is limited to integrity, as attackers can modify or delete content but cannot affect confidentiality or availability. No patches are currently linked, and no known exploits have been observed in the wild. The vulnerability was published on March 22, 2025, and assigned a CVSS v3.1 base score of 4.3, indicating medium severity. This vulnerability highlights the importance of enforcing strict authorization checks even for lower-privileged authenticated users in WordPress plugins that manage content.
Potential Impact
The primary impact of CVE-2024-13737 is unauthorized modification of website content, specifically the creation and deletion of listing templates and posts within the Motors plugin environment. For organizations running car dealership or classified listing websites using this plugin, attackers with Subscriber-level access can manipulate listings, potentially leading to misinformation, defacement, or disruption of business operations. While the vulnerability does not directly compromise sensitive data confidentiality or cause denial of service, the integrity loss can damage brand reputation and user trust. Attackers could also use this capability to remove legitimate listings or inject fraudulent ones, affecting customer experience and revenue. Since the vulnerability requires authentication but only minimal privileges, it broadens the threat surface to include any registered user, including those with minimal trust. The dependency on the Elementor plugin and Motors Starter Theme means that organizations using these combined components are at risk. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially as the vulnerability becomes publicly known.
Mitigation Recommendations
To mitigate CVE-2024-13737, organizations should first verify if they are using the Motors – Car Dealership & Classified Listings plugin version 1.4.57 or earlier in conjunction with the Elementor plugin and Motors Starter Theme. Immediate mitigation steps include restricting user roles and permissions to minimize the number of users with Subscriber-level or higher access, especially on publicly accessible sites. Administrators should audit existing user accounts for unnecessary privileges and remove or downgrade them accordingly. Until an official patch is released, consider disabling or limiting the use of the affected functions via custom code or security plugins that enforce capability checks on motors_create_template and motors_delete_template calls. Monitoring and logging plugin activity related to template creation and deletion can help detect exploitation attempts. Additionally, implementing a Web Application Firewall (WAF) with rules targeting unauthorized access patterns to these functions can provide a protective layer. Regularly check for updates from stylemix and apply patches promptly once available. Finally, educate site administrators and users about the risks of granting excessive permissions and the importance of plugin security hygiene.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-26T17:34:42.653Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e6cb7ef31ef0b5a055d
Added to database: 2/25/2026, 9:49:32 PM
Last enriched: 2/25/2026, 10:16:56 PM
Last updated: 2/26/2026, 8:32:13 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.