Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5545: CWE-862 Missing Authorization in stylemix Motors – Car Dealer, Classifieds & Listing

0
Medium
VulnerabilityCVE-2024-5545cvecve-2024-5545cwe-862
Published: Tue Jul 02 2024 (07/02/2024, 07:37:04 UTC)
Source: CVE Database V5
Vendor/Project: stylemix
Product: Motors – Car Dealer, Classifieds & Listing

Description

CVE-2024-5545 is a medium severity vulnerability in the WordPress plugin 'Motors – Car Dealer, Classifieds & Listing' by stylemix. The flaw arises from a missing authorization check in the stm_edit_delete_user_car function, allowing unauthenticated attackers to unpublish arbitrary posts and pages. This vulnerability affects all versions up to and including 1. 4. 8. Exploitation requires no authentication or user interaction and can impact the integrity of website content by unauthorized modification. There are no known exploits in the wild currently. Organizations using this plugin risk content manipulation that could disrupt business operations or damage reputation. No official patch is currently available, so mitigation involves restricting plugin usage or monitoring for suspicious activity. Countries with significant WordPress usage and automotive classifieds markets are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:40:06 UTC

Technical Analysis

CVE-2024-5545 is a vulnerability classified under CWE-862 (Missing Authorization) found in the 'Motors – Car Dealer, Classifieds & Listing' WordPress plugin developed by stylemix. The issue exists because the function stm_edit_delete_user_car lacks proper capability checks, allowing unauthenticated attackers to invoke it and unpublish arbitrary posts and pages. This means that any attacker without credentials can modify the state of content on affected WordPress sites, specifically by unpublishing listings or pages managed by the plugin. The vulnerability affects all versions up to and including 1.4.8. The CVSS 3.1 base score is 5.3, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). No patches or fixes have been published yet, and no exploits are known to be active in the wild. The vulnerability could be leveraged to disrupt the integrity of website content, potentially harming business operations or user trust. Since the plugin is used primarily in automotive dealer and classifieds websites, the impact is focused on that niche. The lack of authentication requirement and ease of exploitation make this a significant concern for affected sites.

Potential Impact

The primary impact of CVE-2024-5545 is on the integrity of website content managed by the vulnerable plugin. Attackers can unpublish posts and pages without authentication, which can disrupt business operations, especially for automotive dealers and classifieds relying on accurate and available listings. This could lead to loss of revenue, customer trust, and brand reputation. Although confidentiality and availability are not directly affected, the unauthorized modification of content can indirectly cause availability issues if critical listings are removed from public view. The vulnerability could also be used as part of a broader attack chain to cause confusion or facilitate phishing by manipulating legitimate content. Organizations worldwide using this plugin are at risk, particularly those with high traffic or commercial dependency on their WordPress sites. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as public disclosure may prompt attackers to develop exploits.

Mitigation Recommendations

Since no official patch is currently available, organizations should take immediate steps to mitigate risk. First, restrict access to the WordPress admin and plugin management interfaces using IP whitelisting or VPNs to reduce exposure. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the stm_edit_delete_user_car function or related plugin endpoints. Monitor website content and logs for unexpected unpublishing or modification activities. Consider temporarily disabling or removing the plugin if it is not critical to operations. Keep the WordPress core and all other plugins updated to reduce the attack surface. Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. Additionally, educate site administrators about the vulnerability and encourage regular backups to enable quick restoration if content is maliciously altered.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-05-30T18:56:45.746Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bebb7ef31ef0b55c231

Added to database: 2/25/2026, 9:38:51 PM

Last enriched: 2/26/2026, 2:40:06 AM

Last updated: 2/26/2026, 12:44:18 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats