Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1475: CWE-284 Improper Access Control in awordpresslife Coming Soon Maintenance Mode

0
Medium
VulnerabilityCVE-2024-1475cvecve-2024-1475cwe-284
Published: Tue Feb 20 2024 (02/20/2024, 18:56:29 UTC)
Source: CVE Database V5
Vendor/Project: awordpresslife
Product: Coming Soon Maintenance Mode

Description

CVE-2024-1475 is a medium severity vulnerability in the Coming Soon Maintenance Mode WordPress plugin by awordpresslife, affecting all versions up to 1. 0. 5. The flaw allows unauthenticated attackers to exploit improper access control via the REST API to access sensitive post and page content, bypassing the plugin's intended protection. This exposure risks leaking unpublished or private website content. The vulnerability does not impact integrity or availability and requires no authentication or user interaction, making exploitation relatively straightforward. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying mitigations to prevent unauthorized content disclosure. The affected plugin is widely used in WordPress sites globally, with particular risk in countries with high WordPress adoption and active web publishing sectors. Mitigation involves restricting REST API access, disabling the plugin if not needed, or applying custom access controls until an official patch is released.

AI-Powered Analysis

AILast updated: 02/26/2026, 09:36:27 UTC

Technical Analysis

CVE-2024-1475 identifies an improper access control vulnerability (CWE-284) in the Coming Soon Maintenance Mode plugin for WordPress, developed by awordpresslife. This plugin is designed to restrict access to a website during maintenance or pre-launch phases by showing a 'coming soon' page. However, due to insufficient access control enforcement in the plugin's REST API endpoints, unauthenticated attackers can retrieve post and page content that should be protected. The vulnerability affects all versions up to and including 1.0.5. The REST API, which normally requires proper permissions to access content, is improperly configured, allowing sensitive information exposure without authentication or user interaction. The CVSS 3.1 base score is 5.3 (medium), reflecting the ease of exploitation (network vector, no privileges required, no user interaction) but limited impact scope (confidentiality loss only, no integrity or availability impact). No patches have been published yet, and no active exploitation has been reported. This flaw undermines the plugin’s core purpose of protecting unpublished or maintenance-phase content, potentially exposing sensitive or proprietary information to unauthorized parties.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive website content, including unpublished posts and pages that may contain confidential, proprietary, or sensitive information. This can lead to information leakage that compromises business confidentiality, damages reputation, or reveals strategic plans. Although the vulnerability does not affect data integrity or availability, the exposure of sensitive content can facilitate further attacks such as social engineering or targeted phishing. Organizations relying on this plugin for content protection during maintenance or pre-launch phases are at risk of premature content exposure. The ease of exploitation without authentication increases the threat level, especially for websites with sensitive or competitive content. While no known exploits are currently active, the widespread use of WordPress and this plugin means many sites globally could be vulnerable until mitigations or patches are applied.

Mitigation Recommendations

Until an official patch is released, organizations should implement specific mitigations to reduce risk. First, restrict REST API access by configuring WordPress to require authentication for REST endpoints or by using plugins that limit REST API exposure. Second, disable or uninstall the Coming Soon Maintenance Mode plugin if it is not essential. Third, consider replacing it with alternative maintenance mode plugins that have verified secure access controls. Fourth, implement web application firewall (WAF) rules to block unauthorized REST API requests targeting the plugin’s endpoints. Fifth, monitor web server logs for unusual REST API access patterns that may indicate exploitation attempts. Finally, maintain regular backups and prepare to update the plugin promptly once a security patch becomes available from the vendor.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-02-13T17:00:28.586Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d31b7ef31ef0b56ed35

Added to database: 2/25/2026, 9:44:17 PM

Last enriched: 2/26/2026, 9:36:27 AM

Last updated: 2/26/2026, 9:39:36 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats