Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4788: CWE-862 Missing Authorization in duongancol Boostify Header Footer Builder for Elementor

0
Medium
VulnerabilityCVE-2024-4788cvecve-2024-4788cwe-862
Published: Thu Jun 06 2024 (06/06/2024, 02:02:50 UTC)
Source: CVE Database V5
Vendor/Project: duongancol
Product: Boostify Header Footer Builder for Elementor

Description

CVE-2024-4788 is a medium-severity vulnerability in the Boostify Header Footer Builder for Elementor WordPress plugin, affecting all versions up to 1. 3. 3. The flaw arises from a missing authorization check in the create_bhf_post function, allowing authenticated users with subscriber-level access or higher to create pages or posts with arbitrary content. This unauthorized modification can lead to content injection, potentially facilitating phishing, misinformation, or other malicious activities. Exploitation does not require user interaction beyond authentication, and no privilege escalation is needed beyond subscriber-level access. While no known exploits are currently reported in the wild, the vulnerability poses a risk to WordPress sites using this plugin. Mitigation involves updating the plugin once a patch is available or restricting subscriber-level permissions until fixed. Countries with significant WordPress usage and active Elementor plugin deployments are most at risk. The CVSS score is 4.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:55:04 UTC

Technical Analysis

CVE-2024-4788 identifies a missing authorization vulnerability (CWE-862) in the Boostify Header Footer Builder for Elementor plugin for WordPress, specifically in the create_bhf_post function. This function lacks proper capability checks, allowing any authenticated user with subscriber-level permissions or higher to create new pages or posts containing arbitrary content. Since subscriber roles typically have limited capabilities, this vulnerability effectively elevates their ability to modify site content without proper authorization. The vulnerability affects all plugin versions up to and including 1.3.3. Exploitation requires no user interaction beyond authentication and can be performed remotely over the network. The impact is primarily on data integrity, as attackers can inject malicious or misleading content, potentially undermining site trustworthiness or facilitating further attacks such as phishing or social engineering. The CVSS 3.1 base score is 4.3, indicating a medium severity with network attack vector, low attack complexity, and low privileges required. No known public exploits or patches are currently available, but the vulnerability is publicly disclosed as of June 6, 2024. The plugin is widely used among WordPress sites employing Elementor for header and footer customization, increasing the potential attack surface.

Potential Impact

Organizations using the Boostify Header Footer Builder for Elementor plugin are at risk of unauthorized content injection by low-privileged authenticated users. This can lead to reputational damage if malicious content is published, including phishing pages or misinformation. Although the vulnerability does not directly expose sensitive data or disrupt availability, the integrity compromise can facilitate broader attacks or erode user trust. Websites relying on this plugin for critical branding or navigation elements may experience defacement or manipulation of site structure. Attackers with subscriber-level access, which is commonly granted to registered users or commenters, can exploit this flaw without needing elevated privileges, increasing the risk in multi-user environments. The absence of known exploits reduces immediate risk, but the public disclosure may prompt attackers to develop exploits. The vulnerability could be leveraged in targeted attacks against organizations with public-facing WordPress sites using this plugin, especially those with large user bases or high traffic.

Mitigation Recommendations

Until an official patch is released, organizations should restrict subscriber-level user capabilities to prevent unauthorized content creation, possibly by disabling or limiting user registrations or by using role management plugins to tighten permissions. Monitoring and auditing content creation activities for unusual posts or pages is recommended to detect exploitation attempts early. Implementing a web application firewall (WAF) with custom rules to detect and block suspicious requests targeting the create_bhf_post function can provide temporary protection. Site administrators should subscribe to vendor or security mailing lists to receive updates on patches and apply them promptly once available. Additionally, consider isolating or disabling the Boostify Header Footer Builder plugin if it is not essential, or replacing it with alternative plugins that have verified security. Regular backups and incident response plans should be in place to recover from potential content tampering.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-05-10T20:21:54.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b96b7ef31ef0b556f2f

Added to database: 2/25/2026, 9:37:26 PM

Last enriched: 2/26/2026, 12:55:04 AM

Last updated: 2/26/2026, 8:06:08 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats