Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13740: CWE-639 Authorization Bypass Through User-Controlled Key in metagauss ProfileGrid – User Profiles, Groups and Communities

0
Medium
VulnerabilityCVE-2024-13740cvecve-2024-13740cwe-639
Published: Tue Feb 18 2025 (02/18/2025, 02:06:01 UTC)
Source: CVE Database V5
Vendor/Project: metagauss
Product: ProfileGrid – User Profiles, Groups and Communities

Description

CVE-2024-13740 is a medium severity vulnerability affecting the ProfileGrid – User Profiles, Groups and Communities WordPress plugin up to version 5. 9. 4. 2. It arises from an insecure direct object reference (IDOR) in the pm_messenger_show_messages function, where a user-controlled key is not properly validated. Authenticated users with Subscriber-level access or higher can exploit this flaw to read private messages of other users without authorization. The vulnerability does not require user interaction and can be exploited remotely over the network. Although the impact on confidentiality is limited to message disclosure, the integrity and availability of the system remain unaffected. No known public exploits have been reported yet, and no patches are currently available. Organizations using this plugin should prioritize access control reviews and consider temporary mitigations until an official fix is released.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:16:21 UTC

Technical Analysis

CVE-2024-13740 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the ProfileGrid – User Profiles, Groups and Communities plugin for WordPress. The flaw exists in the pm_messenger_show_messages function, which handles the retrieval of private messages between users. Due to missing validation on a user-supplied key parameter, authenticated attackers with at least Subscriber-level privileges can manipulate this key to access private conversations of other users. This constitutes an insecure direct object reference (IDOR) vulnerability, where the application fails to verify that the requesting user is authorized to access the requested resource. The vulnerability affects all versions up to and including 5.9.4.2. Exploitation requires authentication but no additional user interaction, and can be performed remotely via network requests. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the limited confidentiality impact and the requirement for authenticated access. There are no known public exploits or patches available at the time of publication. The vulnerability could lead to unauthorized disclosure of private user communications, potentially exposing sensitive personal or organizational information. This risk is particularly relevant for websites that rely on ProfileGrid for managing user profiles, groups, and private messaging within WordPress environments.

Potential Impact

The primary impact of CVE-2024-13740 is unauthorized disclosure of private messages between users, which compromises confidentiality. Organizations using the vulnerable ProfileGrid plugin risk exposure of sensitive communications, potentially leading to privacy violations, reputational damage, and loss of user trust. While the vulnerability does not affect data integrity or system availability, the breach of private conversations can facilitate social engineering, insider threats, or targeted attacks based on the disclosed information. Since exploitation requires only Subscriber-level authentication, any registered user can potentially access other users' private messages, increasing the attack surface. This is especially concerning for community-driven websites, membership platforms, or intranets where private messaging is used for sensitive discussions. The absence of known exploits reduces immediate risk, but the vulnerability's presence in a popular WordPress plugin means widespread exposure. Organizations worldwide that rely on this plugin for user communication are at risk until a patch is released and applied.

Mitigation Recommendations

1. Immediately audit and restrict user roles and permissions to minimize the number of users with Subscriber-level or higher access if possible. 2. Disable or restrict the use of the private messaging feature within ProfileGrid until a patch is available. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the pm_messenger_show_messages function or unusual parameter manipulation. 4. Monitor logs for anomalous access patterns indicative of unauthorized message retrieval attempts. 5. Encourage users to report any suspicious activity related to private messages. 6. Stay informed about updates from the plugin vendor and apply security patches promptly once released. 7. Consider isolating or sandboxing the ProfileGrid plugin functionality to limit exposure. 8. If feasible, conduct a code review or penetration test focused on authorization controls within the plugin to identify other potential weaknesses. 9. Educate site administrators and developers about secure coding practices to prevent similar IDOR vulnerabilities in customizations or other plugins.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-27T00:01:03.457Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e6cb7ef31ef0b5a0570

Added to database: 2/25/2026, 9:49:32 PM

Last enriched: 2/25/2026, 10:16:21 PM

Last updated: 2/26/2026, 7:21:17 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats