CVE-2024-1479: CWE-863 Incorrect Authorization in edge22 WP Show Posts
CVE-2024-1479 is a medium severity vulnerability in the WP Show Posts WordPress plugin (all versions up to 1. 1. 4) that allows authenticated users with contributor or higher privileges to access sensitive information. Specifically, the vulnerability arises from improper authorization in the wpsp_display function, enabling these users to view draft, trash, future, private, and pending posts and pages that they normally should not access. Exploitation does not require elevated privileges beyond contributor access, nor user interaction beyond authentication. Although no known exploits are currently in the wild, this flaw exposes confidential content and could lead to information leakage within affected WordPress sites. The vulnerability is classified under CWE-863 (Incorrect Authorization) and has a CVSS v3. 1 base score of 5. 3, reflecting its moderate impact. Organizations using WP Show Posts should prioritize updating or applying mitigations to prevent unauthorized data exposure.
AI Analysis
Technical Summary
The WP Show Posts plugin for WordPress, developed by edge22, suffers from an authorization bypass vulnerability identified as CVE-2024-1479. This vulnerability is due to incorrect authorization checks in the wpsp_display function, which is responsible for rendering posts and pages. Authenticated users with contributor-level access or higher can exploit this flaw to view content that should be restricted, including draft, trash, future, private, and pending posts and pages. Normally, contributors have limited access and cannot view private or unpublished content authored by others. However, due to the flawed authorization logic, these users can bypass these restrictions and gain visibility into sensitive unpublished content. The vulnerability affects all versions up to and including 1.1.4 of WP Show Posts. The CVSS v3.1 score of 5.3 (medium severity) reflects that the attack vector is network-based, requires low attack complexity, no privileges beyond contributor, no user interaction, and impacts confidentiality only without affecting integrity or availability. There are no known public exploits or patches currently available, but the risk of sensitive information exposure remains significant for sites using this plugin. This vulnerability falls under CWE-863, which denotes incorrect authorization leading to unauthorized access to resources.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive unpublished content within WordPress sites using the WP Show Posts plugin. Organizations relying on this plugin may inadvertently expose draft posts, private pages, or other non-public content to users with contributor-level access, which could include internal staff or external collaborators. This exposure can lead to information leakage, potentially revealing confidential business plans, unpublished articles, or sensitive internal communications. Although the vulnerability does not allow modification or deletion of content, the breach of confidentiality can undermine trust, violate privacy policies, and expose organizations to reputational damage. For multi-author blogs, editorial teams, or corporate websites, this could result in premature disclosure of strategic information. Since exploitation requires authenticated contributor access, the threat is limited to insiders or compromised contributor accounts, but the ease of exploitation and the scope of affected content make it a notable risk. No impact on system integrity or availability has been reported.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they are using the WP Show Posts plugin and identify the version in use. Since no official patch or update is currently linked, administrators should consider temporarily disabling the plugin until a fix is released. Restrict contributor-level access strictly to trusted users and review user roles to minimize the number of contributors. Implement monitoring and alerting for unusual access patterns to draft or private content. As a workaround, site administrators can audit and harden access controls on unpublished content by using additional access control plugins or custom code to enforce stricter authorization checks. Regularly check for updates from the plugin vendor and apply patches promptly once available. Additionally, conduct security awareness training for contributors to reduce the risk of credential compromise. Finally, consider isolating sensitive content or using alternative plugins with robust authorization mechanisms.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2024-1479: CWE-863 Incorrect Authorization in edge22 WP Show Posts
Description
CVE-2024-1479 is a medium severity vulnerability in the WP Show Posts WordPress plugin (all versions up to 1. 1. 4) that allows authenticated users with contributor or higher privileges to access sensitive information. Specifically, the vulnerability arises from improper authorization in the wpsp_display function, enabling these users to view draft, trash, future, private, and pending posts and pages that they normally should not access. Exploitation does not require elevated privileges beyond contributor access, nor user interaction beyond authentication. Although no known exploits are currently in the wild, this flaw exposes confidential content and could lead to information leakage within affected WordPress sites. The vulnerability is classified under CWE-863 (Incorrect Authorization) and has a CVSS v3. 1 base score of 5. 3, reflecting its moderate impact. Organizations using WP Show Posts should prioritize updating or applying mitigations to prevent unauthorized data exposure.
AI-Powered Analysis
Technical Analysis
The WP Show Posts plugin for WordPress, developed by edge22, suffers from an authorization bypass vulnerability identified as CVE-2024-1479. This vulnerability is due to incorrect authorization checks in the wpsp_display function, which is responsible for rendering posts and pages. Authenticated users with contributor-level access or higher can exploit this flaw to view content that should be restricted, including draft, trash, future, private, and pending posts and pages. Normally, contributors have limited access and cannot view private or unpublished content authored by others. However, due to the flawed authorization logic, these users can bypass these restrictions and gain visibility into sensitive unpublished content. The vulnerability affects all versions up to and including 1.1.4 of WP Show Posts. The CVSS v3.1 score of 5.3 (medium severity) reflects that the attack vector is network-based, requires low attack complexity, no privileges beyond contributor, no user interaction, and impacts confidentiality only without affecting integrity or availability. There are no known public exploits or patches currently available, but the risk of sensitive information exposure remains significant for sites using this plugin. This vulnerability falls under CWE-863, which denotes incorrect authorization leading to unauthorized access to resources.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive unpublished content within WordPress sites using the WP Show Posts plugin. Organizations relying on this plugin may inadvertently expose draft posts, private pages, or other non-public content to users with contributor-level access, which could include internal staff or external collaborators. This exposure can lead to information leakage, potentially revealing confidential business plans, unpublished articles, or sensitive internal communications. Although the vulnerability does not allow modification or deletion of content, the breach of confidentiality can undermine trust, violate privacy policies, and expose organizations to reputational damage. For multi-author blogs, editorial teams, or corporate websites, this could result in premature disclosure of strategic information. Since exploitation requires authenticated contributor access, the threat is limited to insiders or compromised contributor accounts, but the ease of exploitation and the scope of affected content make it a notable risk. No impact on system integrity or availability has been reported.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they are using the WP Show Posts plugin and identify the version in use. Since no official patch or update is currently linked, administrators should consider temporarily disabling the plugin until a fix is released. Restrict contributor-level access strictly to trusted users and review user roles to minimize the number of contributors. Implement monitoring and alerting for unusual access patterns to draft or private content. As a workaround, site administrators can audit and harden access controls on unpublished content by using additional access control plugins or custom code to enforce stricter authorization checks. Regularly check for updates from the plugin vendor and apply patches promptly once available. Additionally, conduct security awareness training for contributors to reduce the risk of credential compromise. Finally, consider isolating sensitive content or using alternative plugins with robust authorization mechanisms.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-02-13T17:47:32.365Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d31b7ef31ef0b56ed46
Added to database: 2/25/2026, 9:44:17 PM
Last enriched: 2/26/2026, 9:37:26 AM
Last updated: 2/26/2026, 12:44:18 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14343: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dokuzsoft Technology Ltd. E-Commerce Product
HighCVE-2026-1198: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Simple SA Simple.ERP
HighCVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.