Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47318: Missing Authorization in Magazine3 PWA for WP & AMP

0
Unknown
VulnerabilityCVE-2024-47318cvecve-2024-47318
Published: Fri Nov 01 2024 (11/01/2024, 14:17:05 UTC)
Source: CVE Database V5
Vendor/Project: Magazine3
Product: PWA for WP & AMP

Description

Missing Authorization vulnerability in Magazine3 PWA for WP & AMP pwa-for-wp.This issue affects PWA for WP & AMP: from n/a through <= 1.7.72.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 05:58:16 UTC

Technical Analysis

CVE-2024-47318 identifies a Missing Authorization vulnerability in the Magazine3 PWA for WP & AMP WordPress plugin, which enables Progressive Web App functionality for WordPress sites. This vulnerability affects all versions up to and including 1.7.72. Missing Authorization means that certain actions or data access points within the plugin do not properly verify whether the requesting user has the necessary permissions. Consequently, an attacker can exploit this flaw to perform unauthorized operations or retrieve sensitive information without authentication. The vulnerability was reserved on September 24, 2024, and published on November 1, 2024, but no CVSS score or patches have been released yet. The plugin is widely used to enhance mobile user experience by enabling PWA features on WordPress sites, making it a valuable target for attackers seeking to compromise websites or extract data. Although no known exploits are currently reported in the wild, the lack of authorization checks presents a significant risk, especially for websites handling sensitive user data or critical business functions. The absence of authentication requirements lowers the barrier for exploitation, potentially allowing remote attackers to abuse the plugin’s functionality. This vulnerability underscores the importance of strict access control mechanisms in web application plugins, particularly those that extend core CMS capabilities.

Potential Impact

The Missing Authorization vulnerability in PWA for WP & AMP can lead to unauthorized access to sensitive data or unauthorized execution of privileged actions on affected WordPress sites. This can compromise the confidentiality and integrity of website content and user data, potentially leading to data leakage, defacement, or unauthorized content manipulation. The availability impact is moderate but could escalate if attackers leverage the vulnerability to disrupt site functionality. Organizations using this plugin, especially media outlets, e-commerce sites, and businesses relying on WordPress for customer engagement, face increased risk of reputational damage, regulatory non-compliance, and financial loss. Since the vulnerability requires no authentication, it broadens the attack surface and increases the likelihood of automated exploitation attempts once details become public. The lack of a patch at the time of disclosure means that affected sites remain vulnerable, necessitating immediate mitigation efforts. The impact is global, affecting any organization using the vulnerable plugin version, with heightened risk in regions with high WordPress adoption and significant online publishing sectors.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following specific mitigations: 1) Restrict access to the plugin’s endpoints by IP whitelisting or web application firewall (WAF) rules to block unauthorized requests. 2) Temporarily disable or deactivate the PWA for WP & AMP plugin if feasible, especially on high-risk or sensitive sites. 3) Audit and tighten user roles and permissions within WordPress to minimize exposure. 4) Monitor web server and application logs for unusual or unauthorized access attempts targeting the plugin. 5) Employ security plugins that can enforce additional authorization checks or block suspicious activity. 6) Stay informed via vendor announcements and security advisories to apply patches promptly once available. 7) Conduct penetration testing focused on plugin endpoints to identify and remediate related weaknesses. These targeted actions go beyond generic advice by focusing on controlling access to the vulnerable plugin components and proactive monitoring to reduce exploitation risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-09-24T13:00:35.587Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd748ee6bfc5ba1def7ef8

Added to database: 4/1/2026, 7:39:58 PM

Last enriched: 4/2/2026, 5:58:16 AM

Last updated: 4/6/2026, 9:39:23 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses