Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13776: CWE-862 Missing Authorization in ZoomIt ZoomSounds - WordPress Wave Audio Player with Playlist

0
High
VulnerabilityCVE-2024-13776cvecve-2024-13776cwe-862
Published: Sat Apr 05 2025 (04/05/2025, 05:32:12 UTC)
Source: CVE Database V5
Vendor/Project: ZoomIt
Product: ZoomSounds - WordPress Wave Audio Player with Playlist

Description

The ZoomSounds - WordPress Wave Audio Player with Playlist plugin for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'dzsap_delete_notice' AJAX action in all versions up to, and including, 6.91. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'seen' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration. There are several other functions also vulnerable to missing authorization.

AI-Powered Analysis

AILast updated: 02/25/2026, 21:57:33 UTC

Technical Analysis

The vulnerability identified as CVE-2024-13776 affects the ZoomSounds - WordPress Wave Audio Player with Playlist plugin, specifically all versions up to and including 6.91. The core issue is a missing authorization check (CWE-862) on the 'dzsap_delete_notice' AJAX action and several other functions within the plugin. This flaw allows authenticated users with minimal privileges (Subscriber-level or higher) to modify option values on the WordPress site without proper permission validation. Attackers can exploit this to update options such as marking notices as 'seen' or toggling registration flags, which can lead to site errors and denial of service conditions. The vulnerability does not require user interaction beyond authentication and can be triggered remotely over the network. The CVSS 3.1 score of 8.1 reflects high impact on integrity and availability, with low attack complexity and no user interaction needed. Although no public exploits have been observed, the vulnerability presents a serious risk to WordPress sites using this plugin, as it enables privilege escalation and potential disruption of site functionality.

Potential Impact

The primary impact of CVE-2024-13776 is unauthorized modification of WordPress site options by low-privileged authenticated users, which can lead to denial of service by causing site errors or misconfigurations. This compromises the integrity of site data and availability of services, potentially disrupting user access and site operations. Attackers could leverage this to escalate privileges indirectly or manipulate site behavior, affecting trust and user experience. Organizations relying on the ZoomSounds plugin for audio playback may face service outages or degraded functionality, impacting content delivery and user engagement. The vulnerability could also be used as a foothold for further attacks within the WordPress environment, increasing overall risk. Given the widespread use of WordPress and the popularity of audio player plugins, the threat has broad implications for website administrators and hosting providers worldwide.

Mitigation Recommendations

To mitigate CVE-2024-13776, organizations should immediately update the ZoomSounds plugin to a patched version once available. In the absence of an official patch, administrators should restrict plugin access by limiting user roles that can interact with the plugin's AJAX actions, ideally removing Subscriber-level users' ability to trigger these functions. Implementing Web Application Firewall (WAF) rules to monitor and block unauthorized AJAX requests targeting 'dzsap_delete_notice' and related actions can reduce exploitation risk. Regularly audit user roles and permissions to ensure minimal necessary access is granted. Additionally, monitoring site logs for unusual option updates or AJAX activity can help detect exploitation attempts early. Backup site configurations and data frequently to enable quick recovery from denial of service conditions caused by exploitation. Finally, consider isolating or disabling the plugin if it is not critical to site operations until a secure version is deployed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-28T19:51:00.431Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e6db7ef31ef0b5a0734

Added to database: 2/25/2026, 9:49:33 PM

Last enriched: 2/25/2026, 9:57:33 PM

Last updated: 2/25/2026, 10:53:29 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats