Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3072: CWE-862 Missing Authorization in horiondigital ACF Front End Editor

0
Medium
VulnerabilityCVE-2024-3072cvecve-2024-3072cwe-862
Published: Tue Apr 30 2024 (04/30/2024, 08:32:23 UTC)
Source: CVE Database V5
Vendor/Project: horiondigital
Product: ACF Front End Editor

Description

CVE-2024-3072 is a medium-severity vulnerability in the horiondigital ACF Front End Editor WordPress plugin, affecting all versions up to 2. 0. 2. The flaw arises from a missing authorization check in the update_texts() function, allowing authenticated users with subscriber-level privileges or higher to modify post titles, content, and Advanced Custom Fields (ACF) data without proper permissions. This unauthorized modification can lead to integrity issues on affected WordPress sites. The vulnerability requires no user interaction beyond authentication and can be exploited remotely over the network. Although no known exploits are currently in the wild, the vulnerability poses a risk to websites using this plugin, especially those with multiple user roles. Mitigation involves applying vendor patches once available or restricting user roles and capabilities to trusted users. Countries with significant WordPress usage and a high number of websites using this plugin are at greater risk, including the United States, United Kingdom, Germany, Australia, Canada, and India.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:02:14 UTC

Technical Analysis

CVE-2024-3072 is a vulnerability identified in the horiondigital ACF Front End Editor plugin for WordPress, affecting all versions up to and including 2.0.2. The issue stems from a missing authorization (capability) check in the update_texts() function, which is responsible for updating post titles, content, and ACF data. Due to this missing check, any authenticated user with subscriber-level access or higher can invoke this function to modify arbitrary post data without proper permissions. This vulnerability is classified under CWE-862 (Missing Authorization) and has a CVSS 3.1 base score of 4.3 (medium severity), reflecting its moderate impact. The attack vector is network-based (remote), requires low attack complexity, and only requires privileges equivalent to a subscriber role, which is commonly assigned to registered users on WordPress sites. No user interaction beyond authentication is needed, and the scope is unchanged, meaning the vulnerability affects only the plugin's data and not the entire system. Although no public exploits are known at this time, the vulnerability could be leveraged to tamper with website content, potentially leading to misinformation, defacement, or manipulation of site data. The plugin is widely used in WordPress environments that utilize Advanced Custom Fields for front-end content editing, making the vulnerability relevant to many websites that rely on this plugin for user-generated content management.

Potential Impact

The primary impact of CVE-2024-3072 is the unauthorized modification of website content, including post titles, body content, and custom fields managed by the ACF Front End Editor plugin. This compromises the integrity of the affected websites, potentially allowing attackers with minimal privileges to alter published information, which could lead to misinformation, reputational damage, or the insertion of malicious content such as phishing links or malware distribution. While confidentiality and availability are not directly impacted, the integrity breach can undermine user trust and damage organizational credibility. For organizations relying on WordPress for content management, especially those with multiple user roles and contributors, this vulnerability increases the risk of insider threats or compromised low-privilege accounts being leveraged for unauthorized content changes. The ease of exploitation and the commonality of subscriber-level accounts make this a notable risk for a broad range of websites, from small blogs to larger corporate sites using the plugin. Although no known exploits are currently reported, the vulnerability's presence in all plugin versions up to 2.0.2 means many sites remain exposed until patched.

Mitigation Recommendations

To mitigate CVE-2024-3072, organizations should first verify if they are using the horiondigital ACF Front End Editor plugin and identify the version in use. Immediate steps include restricting subscriber-level user capabilities to the minimum necessary and auditing user roles to ensure only trusted users have access to the site backend. Until an official patch is released, consider disabling or removing the plugin if it is not essential. For sites requiring the plugin, monitor for updates from the vendor and apply patches promptly once available. Additionally, implement strong authentication controls such as multi-factor authentication (MFA) to reduce the risk of account compromise. Regularly review and monitor logs for unusual content modifications or user activity indicative of exploitation attempts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the update_texts() function or related plugin endpoints. Finally, educate site administrators and content managers about the risk and encourage prompt reporting of unexpected content changes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-03-28T22:25:15.717Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c8cb7ef31ef0b566250

Added to database: 2/25/2026, 9:41:32 PM

Last enriched: 2/26/2026, 6:02:14 AM

Last updated: 2/26/2026, 8:03:14 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats