CVE-2024-13752: CWE-862 Missing Authorization in wedevs WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts
CVE-2024-13752 is a medium severity vulnerability in the WP Project Manager plugin for WordPress, affecting all versions up to 2. 6. 17. It arises from a missing authorization check in the '/pm/v2/settings/notice' REST API endpoint, allowing authenticated users with Subscriber-level access or higher to trigger a persistent denial of service (DoS) condition. The flaw does not impact confidentiality or integrity but can disrupt availability by causing service outages. Exploitation requires no user interaction beyond authentication, and the attack surface includes any WordPress site using this plugin. No known exploits are currently reported in the wild. Organizations relying on this plugin for project management should prioritize patching or applying mitigations to prevent potential service disruptions. Countries with significant WordPress usage and active plugin deployment are at higher risk. Immediate mitigation involves restricting access to the vulnerable endpoint and monitoring for unusual API activity until an official patch is released.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-13752 affects the WP Project Manager plugin for WordPress, which provides task, team, and project management features including kanban boards and gantt charts. The root cause is a missing authorization check (CWE-862) in the REST API endpoint '/pm/v2/settings/notice'. This endpoint fails to verify whether the authenticated user has the necessary permissions to perform certain actions, allowing users with minimal privileges (Subscriber-level or above) to exploit this flaw. The consequence is a persistent denial of service condition, where an attacker can disrupt the availability of the plugin's functionality, potentially impacting project management workflows. The CVSS v3.1 score is 6.5 (medium), reflecting that the vulnerability is remotely exploitable over the network with low attack complexity and no user interaction required, but limited to authenticated users with at least subscriber privileges. There is no impact on confidentiality or integrity, only availability. The vulnerability affects all versions up to and including 2.6.17 of the plugin. No public exploits have been reported yet, but the vulnerability is published and known. The lack of a patch link indicates that a fix may not yet be available, increasing the urgency for interim mitigations. The vulnerability is assigned by Wordfence and was published in February 2025.
Potential Impact
This vulnerability primarily impacts the availability of the WP Project Manager plugin on affected WordPress sites. An attacker with subscriber-level access can cause persistent denial of service, potentially disrupting project management operations, delaying task tracking, and impairing team collaboration. For organizations relying heavily on this plugin for critical workflows, such disruptions could lead to operational inefficiencies and project delays. Although the vulnerability does not expose sensitive data or allow data modification, the loss of service availability can indirectly affect business continuity and productivity. Since the attack requires only low-privilege authenticated access, any compromised or malicious user account could be leveraged to exploit this flaw. The scope includes all WordPress sites using the vulnerable plugin version, which could be widespread given the popularity of WordPress and project management plugins. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is publicly known.
Mitigation Recommendations
1. Immediately restrict access to the '/pm/v2/settings/notice' REST API endpoint by implementing custom access controls or firewall rules at the web server or application level to block unauthorized or subscriber-level users from invoking it. 2. Review and tighten user role permissions within WordPress to minimize the number of users with subscriber-level or higher access, especially on sites with many users. 3. Monitor logs for unusual or repeated access attempts to the vulnerable endpoint to detect potential exploitation attempts early. 4. Disable or deactivate the WP Project Manager plugin temporarily if the project management functionality is non-critical until an official patch is released. 5. Stay updated with the plugin vendor’s announcements and apply security patches promptly once available. 6. Consider implementing a Web Application Firewall (WAF) with custom rules to detect and block exploitation attempts targeting this endpoint. 7. Educate site administrators about the risk and encourage strong authentication practices to reduce the likelihood of compromised accounts. 8. Conduct regular security audits of installed plugins and their permissions to identify and mitigate similar risks proactively.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, Italy, Spain
CVE-2024-13752: CWE-862 Missing Authorization in wedevs WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts
Description
CVE-2024-13752 is a medium severity vulnerability in the WP Project Manager plugin for WordPress, affecting all versions up to 2. 6. 17. It arises from a missing authorization check in the '/pm/v2/settings/notice' REST API endpoint, allowing authenticated users with Subscriber-level access or higher to trigger a persistent denial of service (DoS) condition. The flaw does not impact confidentiality or integrity but can disrupt availability by causing service outages. Exploitation requires no user interaction beyond authentication, and the attack surface includes any WordPress site using this plugin. No known exploits are currently reported in the wild. Organizations relying on this plugin for project management should prioritize patching or applying mitigations to prevent potential service disruptions. Countries with significant WordPress usage and active plugin deployment are at higher risk. Immediate mitigation involves restricting access to the vulnerable endpoint and monitoring for unusual API activity until an official patch is released.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2024-13752 affects the WP Project Manager plugin for WordPress, which provides task, team, and project management features including kanban boards and gantt charts. The root cause is a missing authorization check (CWE-862) in the REST API endpoint '/pm/v2/settings/notice'. This endpoint fails to verify whether the authenticated user has the necessary permissions to perform certain actions, allowing users with minimal privileges (Subscriber-level or above) to exploit this flaw. The consequence is a persistent denial of service condition, where an attacker can disrupt the availability of the plugin's functionality, potentially impacting project management workflows. The CVSS v3.1 score is 6.5 (medium), reflecting that the vulnerability is remotely exploitable over the network with low attack complexity and no user interaction required, but limited to authenticated users with at least subscriber privileges. There is no impact on confidentiality or integrity, only availability. The vulnerability affects all versions up to and including 2.6.17 of the plugin. No public exploits have been reported yet, but the vulnerability is published and known. The lack of a patch link indicates that a fix may not yet be available, increasing the urgency for interim mitigations. The vulnerability is assigned by Wordfence and was published in February 2025.
Potential Impact
This vulnerability primarily impacts the availability of the WP Project Manager plugin on affected WordPress sites. An attacker with subscriber-level access can cause persistent denial of service, potentially disrupting project management operations, delaying task tracking, and impairing team collaboration. For organizations relying heavily on this plugin for critical workflows, such disruptions could lead to operational inefficiencies and project delays. Although the vulnerability does not expose sensitive data or allow data modification, the loss of service availability can indirectly affect business continuity and productivity. Since the attack requires only low-privilege authenticated access, any compromised or malicious user account could be leveraged to exploit this flaw. The scope includes all WordPress sites using the vulnerable plugin version, which could be widespread given the popularity of WordPress and project management plugins. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is publicly known.
Mitigation Recommendations
1. Immediately restrict access to the '/pm/v2/settings/notice' REST API endpoint by implementing custom access controls or firewall rules at the web server or application level to block unauthorized or subscriber-level users from invoking it. 2. Review and tighten user role permissions within WordPress to minimize the number of users with subscriber-level or higher access, especially on sites with many users. 3. Monitor logs for unusual or repeated access attempts to the vulnerable endpoint to detect potential exploitation attempts early. 4. Disable or deactivate the WP Project Manager plugin temporarily if the project management functionality is non-critical until an official patch is released. 5. Stay updated with the plugin vendor’s announcements and apply security patches promptly once available. 6. Consider implementing a Web Application Firewall (WAF) with custom rules to detect and block exploitation attempts targeting this endpoint. 7. Educate site administrators about the risk and encourage strong authentication practices to reduce the likelihood of compromised accounts. 8. Conduct regular security audits of installed plugins and their permissions to identify and mitigate similar risks proactively.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-27T22:10:14.897Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e6db7ef31ef0b5a06a5
Added to database: 2/25/2026, 9:49:33 PM
Last enriched: 2/25/2026, 10:14:00 PM
Last updated: 2/26/2026, 7:21:27 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.