Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31358: Missing Authorization in Saleswonder Team: Tobias 5 Stars Rating Funnel

0
Unknown
VulnerabilityCVE-2024-31358cvecve-2024-31358
Published: Wed Apr 10 2024 (04/10/2024, 15:57:04 UTC)
Source: CVE Database V5
Vendor/Project: Saleswonder Team: Tobias
Product: 5 Stars Rating Funnel

Description

Missing Authorization vulnerability in Saleswonder Team: Tobias 5 Stars Rating Funnel 5-stars-rating-funnel.This issue affects 5 Stars Rating Funnel: from n/a through <= 1.2.67.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 04:33:04 UTC

Technical Analysis

The vulnerability identified as CVE-2024-31358 pertains to a Missing Authorization flaw in the Saleswonder Team's 5 Stars Rating Funnel plugin, versions up to and including 1.2.67. Missing Authorization means that the plugin fails to properly verify whether a user has the necessary permissions before allowing access to certain functionalities or data. This can enable unauthorized users, including unauthenticated attackers, to perform actions or access information that should be restricted. The affected product is commonly used in sales and marketing funnels to collect and display customer ratings, making it a critical component for businesses relying on customer feedback and reputation management. Since no CVSS score has been assigned and no official patches are available, the vulnerability remains unmitigated. The absence of authentication or authorization checks can lead to unauthorized data manipulation, such as altering ratings or extracting sensitive customer information. Although no exploits have been reported in the wild, the vulnerability's nature suggests it could be exploited remotely without user interaction, increasing its risk profile. The lack of detailed technical information limits the ability to fully assess exploitation methods, but the core issue revolves around insufficient access control mechanisms within the plugin's codebase.

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of data managed by the 5 Stars Rating Funnel plugin. Unauthorized users could manipulate rating data, undermining the trustworthiness of customer feedback displayed on websites, which can damage brand reputation and customer trust. Additionally, unauthorized access might expose sensitive customer information collected through the funnel, leading to privacy violations and potential regulatory non-compliance. For organizations relying heavily on customer ratings for marketing and sales conversions, such manipulation can distort business metrics and decision-making. The vulnerability could also be leveraged as a foothold for further attacks within the affected web environment if combined with other vulnerabilities. Since the plugin is integrated into web platforms, exploitation could affect availability if attackers perform disruptive actions. Overall, the threat poses a significant risk to businesses using this plugin, particularly those in e-commerce, digital marketing, and customer engagement sectors.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict access control measures at the web server and application levels to restrict access to the 5 Stars Rating Funnel plugin endpoints. This includes enforcing authentication and authorization via web application firewalls (WAFs) or reverse proxies to block unauthorized requests. Regularly audit and monitor logs for unusual activity related to the plugin's functions. If possible, disable or remove the plugin temporarily in environments where it is not critical. Engage with the vendor or community to obtain updates or patches as soon as they become available. Additionally, conduct code reviews or penetration testing focused on authorization mechanisms within the plugin to identify and remediate weaknesses. Employ network segmentation to limit exposure of the affected systems and ensure backups of rating data are maintained to recover from potential data tampering. Educate development and security teams about the risks of missing authorization controls to prevent similar issues in custom or third-party plugins.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-04-01T06:51:05.775Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7424e6bfc5ba1def5987

Added to database: 4/1/2026, 7:38:12 PM

Last enriched: 4/2/2026, 4:33:04 AM

Last updated: 4/6/2026, 9:24:03 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses