Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13752: CWE-862 Missing Authorization in wedevs WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts

0
Medium
VulnerabilityCVE-2024-13752cvecve-2024-13752cwe-862
Published: Sat Feb 15 2025 (02/15/2025, 09:24:23 UTC)
Source: CVE Database V5
Vendor/Project: wedevs
Product: WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts

Description

CVE-2024-13752 is a medium severity vulnerability in the WP Project Manager plugin for WordPress, affecting all versions up to 2. 6. 17. It arises from a missing authorization check in the '/pm/v2/settings/notice' REST API endpoint, allowing authenticated users with Subscriber-level access or higher to trigger a persistent denial of service (DoS) condition. The flaw does not impact confidentiality or integrity but can disrupt availability by causing service outages. Exploitation requires no user interaction beyond authentication, and the attack surface includes any WordPress site using this plugin. No known exploits are currently reported in the wild. Organizations relying on this plugin for project management should prioritize patching or applying mitigations to prevent potential service disruptions. Countries with significant WordPress usage and active plugin deployment are at higher risk. Immediate mitigation involves restricting access to the vulnerable endpoint and monitoring for unusual API activity until an official patch is released.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:14:00 UTC

Technical Analysis

The vulnerability identified as CVE-2024-13752 affects the WP Project Manager plugin for WordPress, which provides task, team, and project management features including kanban boards and gantt charts. The root cause is a missing authorization check (CWE-862) in the REST API endpoint '/pm/v2/settings/notice'. This endpoint fails to verify whether the authenticated user has the necessary permissions to perform certain actions, allowing users with minimal privileges (Subscriber-level or above) to exploit this flaw. The consequence is a persistent denial of service condition, where an attacker can disrupt the availability of the plugin's functionality, potentially impacting project management workflows. The CVSS v3.1 score is 6.5 (medium), reflecting that the vulnerability is remotely exploitable over the network with low attack complexity and no user interaction required, but limited to authenticated users with at least subscriber privileges. There is no impact on confidentiality or integrity, only availability. The vulnerability affects all versions up to and including 2.6.17 of the plugin. No public exploits have been reported yet, but the vulnerability is published and known. The lack of a patch link indicates that a fix may not yet be available, increasing the urgency for interim mitigations. The vulnerability is assigned by Wordfence and was published in February 2025.

Potential Impact

This vulnerability primarily impacts the availability of the WP Project Manager plugin on affected WordPress sites. An attacker with subscriber-level access can cause persistent denial of service, potentially disrupting project management operations, delaying task tracking, and impairing team collaboration. For organizations relying heavily on this plugin for critical workflows, such disruptions could lead to operational inefficiencies and project delays. Although the vulnerability does not expose sensitive data or allow data modification, the loss of service availability can indirectly affect business continuity and productivity. Since the attack requires only low-privilege authenticated access, any compromised or malicious user account could be leveraged to exploit this flaw. The scope includes all WordPress sites using the vulnerable plugin version, which could be widespread given the popularity of WordPress and project management plugins. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is publicly known.

Mitigation Recommendations

1. Immediately restrict access to the '/pm/v2/settings/notice' REST API endpoint by implementing custom access controls or firewall rules at the web server or application level to block unauthorized or subscriber-level users from invoking it. 2. Review and tighten user role permissions within WordPress to minimize the number of users with subscriber-level or higher access, especially on sites with many users. 3. Monitor logs for unusual or repeated access attempts to the vulnerable endpoint to detect potential exploitation attempts early. 4. Disable or deactivate the WP Project Manager plugin temporarily if the project management functionality is non-critical until an official patch is released. 5. Stay updated with the plugin vendor’s announcements and apply security patches promptly once available. 6. Consider implementing a Web Application Firewall (WAF) with custom rules to detect and block exploitation attempts targeting this endpoint. 7. Educate site administrators about the risk and encourage strong authentication practices to reduce the likelihood of compromised accounts. 8. Conduct regular security audits of installed plugins and their permissions to identify and mitigate similar risks proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-27T22:10:14.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e6db7ef31ef0b5a06a5

Added to database: 2/25/2026, 9:49:33 PM

Last enriched: 2/25/2026, 10:14:00 PM

Last updated: 2/26/2026, 7:21:27 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats