CVE-2024-5087: CWE-862 Missing Authorization in webfactory Minimal Coming Soon – Coming Soon Page
CVE-2024-5087 is a medium severity vulnerability in the Minimal Coming Soon – Coming Soon Page WordPress plugin by webfactory. The flaw arises from missing authorization checks in AJAX functions (validate_ajax, deactivate_ajax, save_ajax), allowing authenticated users with Subscriber-level access or higher to modify sensitive plugin data, including the license key. Exploitation does not require user interaction and can impact confidentiality, integrity, and availability of plugin features. No known exploits are currently reported in the wild. This vulnerability affects all versions up to and including 2. 38. Organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized license key modifications that could disable plugin functionality.
AI Analysis
Technical Summary
The Minimal Coming Soon – Coming Soon Page plugin for WordPress suffers from a missing authorization vulnerability classified as CWE-862. Specifically, the plugin's AJAX handlers—validate_ajax, deactivate_ajax, and save_ajax—lack proper capability checks to verify if the requesting user has sufficient privileges before allowing modification of plugin data. This flaw permits any authenticated user with at least Subscriber-level access to alter the license key stored by the plugin. Since WordPress Subscriber roles are typically assigned to low-privilege users, this vulnerability significantly lowers the bar for exploitation. The absence of user interaction requirements and the network attack vector (AV:N) make this vulnerability easier to exploit remotely. The CVSS 3.1 base score is 6.3 (medium), reflecting the moderate impact on confidentiality, integrity, and availability. Modifying the license key could disable plugin features, potentially disrupting website functionality or causing denial of service for the affected plugin. No patches or known exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The issue affects all versions up to 2.38 inclusive.
Potential Impact
This vulnerability allows low-privileged authenticated users to modify the license key of the Minimal Coming Soon plugin, which can lead to disabling critical plugin features. This can degrade website availability and functionality, especially for sites relying on this plugin for managing coming soon or maintenance pages. Unauthorized license key changes could also lead to loss of access to premium features or updates, increasing operational risk. Confidentiality and integrity impacts are moderate since the attacker can alter plugin data but not necessarily access broader site data or escalate privileges directly. However, the ease of exploitation by low-privilege users increases the risk profile. Organizations with multiple users or open registration on WordPress sites are particularly vulnerable. The disruption could affect marketing, user experience, and site launch timelines. While no known exploits exist currently, the public disclosure increases the likelihood of future exploitation attempts.
Mitigation Recommendations
Administrators should immediately verify if they are running the Minimal Coming Soon – Coming Soon Page plugin version 2.38 or earlier and plan to update to a patched version once available. In the absence of an official patch, implement the following mitigations: 1) Restrict user roles to minimize Subscriber-level accounts or disable unnecessary user registrations. 2) Use WordPress security plugins or custom code to enforce capability checks on AJAX endpoints related to this plugin. 3) Monitor logs for suspicious AJAX requests targeting validate_ajax, deactivate_ajax, and save_ajax functions. 4) Temporarily disable or deactivate the plugin if it is not critical to site operations. 5) Employ web application firewalls (WAFs) to detect and block unauthorized AJAX requests. 6) Educate site administrators and users about the risk and encourage strong access control policies. 7) Regularly back up site data and plugin configurations to enable recovery if unauthorized changes occur.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-5087: CWE-862 Missing Authorization in webfactory Minimal Coming Soon – Coming Soon Page
Description
CVE-2024-5087 is a medium severity vulnerability in the Minimal Coming Soon – Coming Soon Page WordPress plugin by webfactory. The flaw arises from missing authorization checks in AJAX functions (validate_ajax, deactivate_ajax, save_ajax), allowing authenticated users with Subscriber-level access or higher to modify sensitive plugin data, including the license key. Exploitation does not require user interaction and can impact confidentiality, integrity, and availability of plugin features. No known exploits are currently reported in the wild. This vulnerability affects all versions up to and including 2. 38. Organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized license key modifications that could disable plugin functionality.
AI-Powered Analysis
Technical Analysis
The Minimal Coming Soon – Coming Soon Page plugin for WordPress suffers from a missing authorization vulnerability classified as CWE-862. Specifically, the plugin's AJAX handlers—validate_ajax, deactivate_ajax, and save_ajax—lack proper capability checks to verify if the requesting user has sufficient privileges before allowing modification of plugin data. This flaw permits any authenticated user with at least Subscriber-level access to alter the license key stored by the plugin. Since WordPress Subscriber roles are typically assigned to low-privilege users, this vulnerability significantly lowers the bar for exploitation. The absence of user interaction requirements and the network attack vector (AV:N) make this vulnerability easier to exploit remotely. The CVSS 3.1 base score is 6.3 (medium), reflecting the moderate impact on confidentiality, integrity, and availability. Modifying the license key could disable plugin features, potentially disrupting website functionality or causing denial of service for the affected plugin. No patches or known exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The issue affects all versions up to 2.38 inclusive.
Potential Impact
This vulnerability allows low-privileged authenticated users to modify the license key of the Minimal Coming Soon plugin, which can lead to disabling critical plugin features. This can degrade website availability and functionality, especially for sites relying on this plugin for managing coming soon or maintenance pages. Unauthorized license key changes could also lead to loss of access to premium features or updates, increasing operational risk. Confidentiality and integrity impacts are moderate since the attacker can alter plugin data but not necessarily access broader site data or escalate privileges directly. However, the ease of exploitation by low-privilege users increases the risk profile. Organizations with multiple users or open registration on WordPress sites are particularly vulnerable. The disruption could affect marketing, user experience, and site launch timelines. While no known exploits exist currently, the public disclosure increases the likelihood of future exploitation attempts.
Mitigation Recommendations
Administrators should immediately verify if they are running the Minimal Coming Soon – Coming Soon Page plugin version 2.38 or earlier and plan to update to a patched version once available. In the absence of an official patch, implement the following mitigations: 1) Restrict user roles to minimize Subscriber-level accounts or disable unnecessary user registrations. 2) Use WordPress security plugins or custom code to enforce capability checks on AJAX endpoints related to this plugin. 3) Monitor logs for suspicious AJAX requests targeting validate_ajax, deactivate_ajax, and save_ajax functions. 4) Temporarily disable or deactivate the plugin if it is not critical to site operations. 5) Employ web application firewalls (WAFs) to detect and block unauthorized AJAX requests. 6) Educate site administrators and users about the risk and encourage strong access control policies. 7) Regularly back up site data and plugin configurations to enable recovery if unauthorized changes occur.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-05-17T23:18:12.724Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bdeb7ef31ef0b55b965
Added to database: 2/25/2026, 9:38:38 PM
Last enriched: 2/26/2026, 2:23:39 AM
Last updated: 2/26/2026, 6:12:54 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.