CVE-2024-13740: CWE-639 Authorization Bypass Through User-Controlled Key in metagauss ProfileGrid – User Profiles, Groups and Communities
CVE-2024-13740 is a medium severity vulnerability affecting the ProfileGrid – User Profiles, Groups and Communities WordPress plugin up to version 5. 9. 4. 2. It arises from an insecure direct object reference (IDOR) in the pm_messenger_show_messages function, where a user-controlled key is not properly validated. Authenticated users with Subscriber-level access or higher can exploit this flaw to read private messages of other users without authorization. The vulnerability does not require user interaction and can be exploited remotely over the network. Although the impact on confidentiality is limited to message disclosure, the integrity and availability of the system remain unaffected. No known public exploits have been reported yet, and no patches are currently available. Organizations using this plugin should prioritize access control reviews and consider temporary mitigations until an official fix is released.
AI Analysis
Technical Summary
CVE-2024-13740 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the ProfileGrid – User Profiles, Groups and Communities plugin for WordPress. The flaw exists in the pm_messenger_show_messages function, which handles the retrieval of private messages between users. Due to missing validation on a user-supplied key parameter, authenticated attackers with at least Subscriber-level privileges can manipulate this key to access private conversations of other users. This constitutes an insecure direct object reference (IDOR) vulnerability, where the application fails to verify that the requesting user is authorized to access the requested resource. The vulnerability affects all versions up to and including 5.9.4.2. Exploitation requires authentication but no additional user interaction, and can be performed remotely via network requests. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the limited confidentiality impact and the requirement for authenticated access. There are no known public exploits or patches available at the time of publication. The vulnerability could lead to unauthorized disclosure of private user communications, potentially exposing sensitive personal or organizational information. This risk is particularly relevant for websites that rely on ProfileGrid for managing user profiles, groups, and private messaging within WordPress environments.
Potential Impact
The primary impact of CVE-2024-13740 is unauthorized disclosure of private messages between users, which compromises confidentiality. Organizations using the vulnerable ProfileGrid plugin risk exposure of sensitive communications, potentially leading to privacy violations, reputational damage, and loss of user trust. While the vulnerability does not affect data integrity or system availability, the breach of private conversations can facilitate social engineering, insider threats, or targeted attacks based on the disclosed information. Since exploitation requires only Subscriber-level authentication, any registered user can potentially access other users' private messages, increasing the attack surface. This is especially concerning for community-driven websites, membership platforms, or intranets where private messaging is used for sensitive discussions. The absence of known exploits reduces immediate risk, but the vulnerability's presence in a popular WordPress plugin means widespread exposure. Organizations worldwide that rely on this plugin for user communication are at risk until a patch is released and applied.
Mitigation Recommendations
1. Immediately audit and restrict user roles and permissions to minimize the number of users with Subscriber-level or higher access if possible. 2. Disable or restrict the use of the private messaging feature within ProfileGrid until a patch is available. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the pm_messenger_show_messages function or unusual parameter manipulation. 4. Monitor logs for anomalous access patterns indicative of unauthorized message retrieval attempts. 5. Encourage users to report any suspicious activity related to private messages. 6. Stay informed about updates from the plugin vendor and apply security patches promptly once released. 7. Consider isolating or sandboxing the ProfileGrid plugin functionality to limit exposure. 8. If feasible, conduct a code review or penetration test focused on authorization controls within the plugin to identify other potential weaknesses. 9. Educate site administrators and developers about secure coding practices to prevent similar IDOR vulnerabilities in customizations or other plugins.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, Italy, Spain
CVE-2024-13740: CWE-639 Authorization Bypass Through User-Controlled Key in metagauss ProfileGrid – User Profiles, Groups and Communities
Description
CVE-2024-13740 is a medium severity vulnerability affecting the ProfileGrid – User Profiles, Groups and Communities WordPress plugin up to version 5. 9. 4. 2. It arises from an insecure direct object reference (IDOR) in the pm_messenger_show_messages function, where a user-controlled key is not properly validated. Authenticated users with Subscriber-level access or higher can exploit this flaw to read private messages of other users without authorization. The vulnerability does not require user interaction and can be exploited remotely over the network. Although the impact on confidentiality is limited to message disclosure, the integrity and availability of the system remain unaffected. No known public exploits have been reported yet, and no patches are currently available. Organizations using this plugin should prioritize access control reviews and consider temporary mitigations until an official fix is released.
AI-Powered Analysis
Technical Analysis
CVE-2024-13740 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the ProfileGrid – User Profiles, Groups and Communities plugin for WordPress. The flaw exists in the pm_messenger_show_messages function, which handles the retrieval of private messages between users. Due to missing validation on a user-supplied key parameter, authenticated attackers with at least Subscriber-level privileges can manipulate this key to access private conversations of other users. This constitutes an insecure direct object reference (IDOR) vulnerability, where the application fails to verify that the requesting user is authorized to access the requested resource. The vulnerability affects all versions up to and including 5.9.4.2. Exploitation requires authentication but no additional user interaction, and can be performed remotely via network requests. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the limited confidentiality impact and the requirement for authenticated access. There are no known public exploits or patches available at the time of publication. The vulnerability could lead to unauthorized disclosure of private user communications, potentially exposing sensitive personal or organizational information. This risk is particularly relevant for websites that rely on ProfileGrid for managing user profiles, groups, and private messaging within WordPress environments.
Potential Impact
The primary impact of CVE-2024-13740 is unauthorized disclosure of private messages between users, which compromises confidentiality. Organizations using the vulnerable ProfileGrid plugin risk exposure of sensitive communications, potentially leading to privacy violations, reputational damage, and loss of user trust. While the vulnerability does not affect data integrity or system availability, the breach of private conversations can facilitate social engineering, insider threats, or targeted attacks based on the disclosed information. Since exploitation requires only Subscriber-level authentication, any registered user can potentially access other users' private messages, increasing the attack surface. This is especially concerning for community-driven websites, membership platforms, or intranets where private messaging is used for sensitive discussions. The absence of known exploits reduces immediate risk, but the vulnerability's presence in a popular WordPress plugin means widespread exposure. Organizations worldwide that rely on this plugin for user communication are at risk until a patch is released and applied.
Mitigation Recommendations
1. Immediately audit and restrict user roles and permissions to minimize the number of users with Subscriber-level or higher access if possible. 2. Disable or restrict the use of the private messaging feature within ProfileGrid until a patch is available. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the pm_messenger_show_messages function or unusual parameter manipulation. 4. Monitor logs for anomalous access patterns indicative of unauthorized message retrieval attempts. 5. Encourage users to report any suspicious activity related to private messages. 6. Stay informed about updates from the plugin vendor and apply security patches promptly once released. 7. Consider isolating or sandboxing the ProfileGrid plugin functionality to limit exposure. 8. If feasible, conduct a code review or penetration test focused on authorization controls within the plugin to identify other potential weaknesses. 9. Educate site administrators and developers about secure coding practices to prevent similar IDOR vulnerabilities in customizations or other plugins.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-27T00:01:03.457Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e6cb7ef31ef0b5a0570
Added to database: 2/25/2026, 9:49:32 PM
Last enriched: 2/25/2026, 10:16:21 PM
Last updated: 2/26/2026, 7:21:17 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.