CVE-2024-1860: CWE-862 Missing Authorization in sminozzi Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan
The Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the antihacker_add_whitelist() function in all versions up to, and including, 4.51. This makes it possible for unauthenticated attackers to add their IP Address to the whitelist circumventing protection
AI Analysis
Technical Summary
CVE-2024-1860 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan' developed by sminozzi. This plugin is designed to enhance WordPress security by disabling certain APIs and features that are commonly exploited by attackers, such as the JSON API, XMLRPC, and pingback functionalities, as well as implementing login lockdown and user enumeration protections. The vulnerability arises from a missing capability check in the antihacker_add_whitelist() function, which is responsible for adding IP addresses to a whitelist that bypasses certain security restrictions. Due to the lack of proper authorization controls, unauthenticated attackers can exploit this flaw to add their own IP addresses to the whitelist. This effectively allows them to circumvent the plugin's protective mechanisms, potentially enabling further attacks such as brute force login attempts, enumeration, or exploitation of other vulnerabilities that the plugin is intended to mitigate. The vulnerability affects all versions of the plugin up to and including version 4.51. No patches or updates have been explicitly linked or released at the time of this analysis, and there are no known exploits in the wild. The vulnerability was publicly disclosed on February 28, 2024, and has been enriched by CISA, indicating recognition by authoritative cybersecurity entities. The ease of exploitation is high since no authentication or user interaction is required, and the impact is significant because it undermines the core security functions of the plugin, potentially exposing WordPress sites to further compromise.
Potential Impact
For European organizations, this vulnerability poses a moderate to high risk, especially for those relying on WordPress websites with this specific security plugin installed. By allowing unauthenticated attackers to whitelist their IP addresses, the attackers can bypass critical security controls designed to prevent brute force attacks, user enumeration, and exploitation of XMLRPC or JSON API-related vulnerabilities. This could lead to unauthorized access to administrative accounts, data leakage, defacement, or use of the compromised site as a pivot point for broader network attacks. Organizations in sectors with high web presence such as e-commerce, media, government, and critical infrastructure are particularly at risk. The impact on confidentiality is moderate due to potential unauthorized access; integrity is also at risk if attackers modify site content or configurations; availability could be affected if attackers launch denial-of-service attacks or lock out legitimate users. Given the widespread use of WordPress across Europe, the scope of affected systems is substantial. The vulnerability undermines trust in web-facing assets and could lead to reputational damage and regulatory consequences under GDPR if personal data is compromised.
Mitigation Recommendations
1. Immediate manual review and restriction of the whitelist entries in the plugin configuration to ensure no unauthorized IPs are present. 2. Temporarily disable or uninstall the affected plugin until a security patch or update is released by the vendor. 3. Monitor web server and WordPress logs for suspicious activity, especially repeated login attempts or unusual IP addresses gaining whitelist status. 4. Implement additional web application firewall (WAF) rules to block unauthorized access attempts to the plugin's endpoints or functions related to whitelist management. 5. Employ network-level IP filtering to restrict access to administrative interfaces and sensitive endpoints. 6. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and configurations. 7. Educate site administrators about the risks of using outdated or unpatched plugins and encourage timely updates. 8. Follow vendor communications closely for patch releases and apply updates promptly once available. 9. Consider deploying multi-factor authentication (MFA) on WordPress admin accounts to mitigate the risk of unauthorized access even if the whitelist is compromised.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2024-1860: CWE-862 Missing Authorization in sminozzi Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan
Description
The Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the antihacker_add_whitelist() function in all versions up to, and including, 4.51. This makes it possible for unauthenticated attackers to add their IP Address to the whitelist circumventing protection
AI-Powered Analysis
Technical Analysis
CVE-2024-1860 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan' developed by sminozzi. This plugin is designed to enhance WordPress security by disabling certain APIs and features that are commonly exploited by attackers, such as the JSON API, XMLRPC, and pingback functionalities, as well as implementing login lockdown and user enumeration protections. The vulnerability arises from a missing capability check in the antihacker_add_whitelist() function, which is responsible for adding IP addresses to a whitelist that bypasses certain security restrictions. Due to the lack of proper authorization controls, unauthenticated attackers can exploit this flaw to add their own IP addresses to the whitelist. This effectively allows them to circumvent the plugin's protective mechanisms, potentially enabling further attacks such as brute force login attempts, enumeration, or exploitation of other vulnerabilities that the plugin is intended to mitigate. The vulnerability affects all versions of the plugin up to and including version 4.51. No patches or updates have been explicitly linked or released at the time of this analysis, and there are no known exploits in the wild. The vulnerability was publicly disclosed on February 28, 2024, and has been enriched by CISA, indicating recognition by authoritative cybersecurity entities. The ease of exploitation is high since no authentication or user interaction is required, and the impact is significant because it undermines the core security functions of the plugin, potentially exposing WordPress sites to further compromise.
Potential Impact
For European organizations, this vulnerability poses a moderate to high risk, especially for those relying on WordPress websites with this specific security plugin installed. By allowing unauthenticated attackers to whitelist their IP addresses, the attackers can bypass critical security controls designed to prevent brute force attacks, user enumeration, and exploitation of XMLRPC or JSON API-related vulnerabilities. This could lead to unauthorized access to administrative accounts, data leakage, defacement, or use of the compromised site as a pivot point for broader network attacks. Organizations in sectors with high web presence such as e-commerce, media, government, and critical infrastructure are particularly at risk. The impact on confidentiality is moderate due to potential unauthorized access; integrity is also at risk if attackers modify site content or configurations; availability could be affected if attackers launch denial-of-service attacks or lock out legitimate users. Given the widespread use of WordPress across Europe, the scope of affected systems is substantial. The vulnerability undermines trust in web-facing assets and could lead to reputational damage and regulatory consequences under GDPR if personal data is compromised.
Mitigation Recommendations
1. Immediate manual review and restriction of the whitelist entries in the plugin configuration to ensure no unauthorized IPs are present. 2. Temporarily disable or uninstall the affected plugin until a security patch or update is released by the vendor. 3. Monitor web server and WordPress logs for suspicious activity, especially repeated login attempts or unusual IP addresses gaining whitelist status. 4. Implement additional web application firewall (WAF) rules to block unauthorized access attempts to the plugin's endpoints or functions related to whitelist management. 5. Employ network-level IP filtering to restrict access to administrative interfaces and sensitive endpoints. 6. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and configurations. 7. Educate site administrators about the risks of using outdated or unpatched plugins and encourage timely updates. 8. Follow vendor communications closely for patch releases and apply updates promptly once available. 9. Consider deploying multi-factor authentication (MFA) on WordPress admin accounts to mitigate the risk of unauthorized access even if the whitelist is compromised.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-02-23T18:51:36.723Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6f1f
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 7:54:49 PM
Last updated: 8/1/2025, 9:10:41 AM
Views: 12
Related Threats
CVE-2025-57701: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57700: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
HighCVE-2025-9109: Observable Response Discrepancy in Portabilis i-Diario
MediumCVE-2025-9108: Improper Restriction of Rendered UI Layers in Portabilis i-Diario
MediumCVE-2025-9107: Cross Site Scripting in Portabilis i-Diario
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.