Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-49698: Missing Authorization in PriceListo Best Restaurant Menu by PriceListo

0
Unknown
VulnerabilityCVE-2024-49698cvecve-2024-49698
Published: Tue Dec 31 2024 (12/31/2024, 13:53:26 UTC)
Source: CVE Database V5
Vendor/Project: PriceListo
Product: Best Restaurant Menu by PriceListo

Description

Missing Authorization vulnerability in PriceListo Best Restaurant Menu by PriceListo best-restaurant-menu-by-pricelisto.This issue affects Best Restaurant Menu by PriceListo: from n/a through <= 1.4.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 07:22:46 UTC

Technical Analysis

CVE-2024-49698 identifies a Missing Authorization vulnerability in the WordPress plugin 'Best Restaurant Menu by PriceListo' versions up to and including 1.4.2. Missing Authorization means that certain functions or endpoints within the plugin do not properly verify whether the user has the necessary permissions before allowing access or actions. This can lead to unauthorized users, including unauthenticated visitors or low-privilege users, performing operations intended only for administrators or privileged roles. The plugin is designed to manage restaurant menus on WordPress sites, so unauthorized access could allow attackers to view, modify, or delete menu items, prices, or related data, potentially damaging the integrity and availability of the restaurant's online menu. Although no public exploits have been reported yet, the vulnerability is publicly disclosed and could be targeted by attackers once weaponized. The vulnerability affects all versions up to 1.4.2, with no patch currently available or linked. The lack of a CVSS score suggests the need for an independent severity assessment. Given the nature of missing authorization, the risk includes data manipulation and service disruption, which can impact business reputation and customer trust. The vulnerability is relevant primarily to WordPress sites using this specific plugin, which is a niche but important segment within the hospitality sector's online presence.

Potential Impact

The impact of CVE-2024-49698 can be significant for organizations operating restaurant websites using the vulnerable plugin. Unauthorized access to menu management functions can lead to data integrity issues, such as incorrect menu items, prices, or availability being displayed to customers, potentially causing financial loss and reputational damage. Attackers could disrupt normal business operations by deleting or altering menu content, leading to customer confusion and loss of sales. In some cases, if the plugin interfaces with ordering or payment systems, unauthorized changes could have broader implications. The vulnerability does not appear to allow direct system compromise or data exfiltration beyond the plugin scope, limiting the confidentiality impact. However, the ease of exploitation due to missing authorization and the potential for widespread impact on affected websites elevate the threat level. Organizations relying on this plugin without proper access controls or timely patching are at risk of service disruption and customer trust erosion.

Mitigation Recommendations

To mitigate CVE-2024-49698, organizations should first monitor for an official patch or update from the PriceListo plugin developers and apply it immediately upon release. Until a patch is available, administrators should restrict access to the WordPress admin dashboard and specifically to the plugin's menu management pages using additional access control mechanisms such as IP whitelisting, two-factor authentication, or role-based access controls. Web application firewalls (WAFs) can be configured to detect and block unauthorized requests targeting the plugin endpoints. Regularly auditing user roles and permissions to ensure only trusted users have administrative capabilities is critical. Additionally, website owners should maintain regular backups of their site and database to enable quick restoration in case of unauthorized modifications. Monitoring website content for unexpected changes can help detect exploitation attempts early. Finally, consider disabling or replacing the plugin with a more secure alternative if timely patching is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-17T09:52:25.273Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd74e5e6bfc5ba1df019d5

Added to database: 4/1/2026, 7:41:25 PM

Last enriched: 4/2/2026, 7:22:46 AM

Last updated: 4/4/2026, 6:30:52 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses