Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1860: CWE-862 Missing Authorization in sminozzi Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan

0
Medium
VulnerabilityCVE-2024-1860cvecve-2024-1860cwe-862
Published: Wed Feb 28 2024 (02/28/2024, 09:33:34 UTC)
Source: CVE
Vendor/Project: sminozzi
Product: Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan

Description

The Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the antihacker_add_whitelist() function in all versions up to, and including, 4.51. This makes it possible for unauthenticated attackers to add their IP Address to the whitelist circumventing protection

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 08:55:29 UTC

Technical Analysis

CVE-2024-1860 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WordPress plugin 'Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan' developed by sminozzi. The issue stems from the antihacker_add_whitelist() function lacking proper capability checks, which means that any unauthenticated attacker can invoke this function to add their IP address to the plugin's whitelist. The whitelist is intended to exempt trusted IPs from security restrictions such as login lockdowns or user enumeration protections. By adding their IP, attackers can bypass these defenses, enabling them to perform brute force attacks, enumeration, or other malicious activities without being blocked. The vulnerability affects all versions up to 4.51, with no patches currently available. The CVSS v3.1 score is 6.5 (medium), reflecting the network attack vector, no required privileges or user interaction, and limited impact on confidentiality and integrity but no impact on availability. The vulnerability does not require authentication, making it easier to exploit remotely. Although no active exploits are known, the flaw presents a significant risk to WordPress sites relying on this plugin for security hardening.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification of the plugin's whitelist, which can allow attackers to circumvent critical security protections such as login lockdown and user enumeration prevention. This can lead to increased risk of brute force attacks, credential stuffing, and reconnaissance activities against WordPress sites. Confidentiality may be compromised if attackers successfully enumerate users or gain access through brute force attempts that would otherwise be blocked. Integrity is also at risk because attackers can manipulate access controls to evade detection and restrictions. While availability is not directly impacted, successful exploitation can lead to further attacks that may degrade service or compromise the site. Organizations worldwide using this plugin are at risk of targeted or opportunistic attacks, especially those with high-value WordPress installations or sensitive data. The ease of exploitation and lack of authentication requirements increase the threat level, particularly for sites that rely heavily on this plugin for security.

Mitigation Recommendations

1. Immediately update the plugin once a patch is released by the vendor to include proper authorization checks in the antihacker_add_whitelist() function. 2. Until a patch is available, consider disabling or uninstalling the plugin to prevent exploitation. 3. Implement additional network-level protections such as web application firewalls (WAFs) to detect and block suspicious requests attempting to manipulate the whitelist. 4. Monitor WordPress logs and plugin activity for unusual IP whitelist additions or other anomalous behavior. 5. Restrict administrative access to the WordPress backend using IP whitelisting or VPNs to reduce exposure. 6. Employ multi-factor authentication (MFA) for WordPress admin accounts to mitigate the impact of brute force attacks. 7. Regularly audit plugin permissions and configurations to ensure no unauthorized changes have been made. 8. Educate site administrators about this vulnerability and encourage vigilance for suspicious activity related to login lockdown and enumeration protections.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-02-23T18:51:36.723Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6f1f

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 2/28/2026, 8:55:29 AM

Last updated: 3/24/2026, 8:33:47 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses