CVE-2024-5637: CWE-862 Missing Authorization in vanyukov Market Exporter
CVE-2024-5637 is a high-severity vulnerability in the vanyukov Market Exporter WordPress plugin (up to version 2. 0. 19) that allows authenticated users with Subscriber-level access or higher to delete arbitrary files on the server via a missing authorization check in the 'remove_files' function. The flaw enables path traversal attacks leading to unauthorized file deletion without requiring elevated privileges beyond basic authentication. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to website availability and data integrity. Exploitation requires no user interaction and can be performed remotely over the network. Organizations using this plugin should prioritize patching or applying mitigations immediately to prevent potential service disruption or data loss. Countries with large WordPress user bases and e-commerce activity are most at risk. The CVSS score is 7. 5, reflecting high impact on availability with low attack complexity and no user interaction needed.
AI Analysis
Technical Summary
CVE-2024-5637 is a vulnerability identified in the Market Exporter plugin for WordPress, developed by vanyukov, affecting all versions up to and including 2.0.19. The core issue is a missing authorization check (CWE-862) on the 'remove_files' function, which fails to verify whether the authenticated user has the necessary capabilities to perform file deletion operations. This allows any authenticated user with at least Subscriber-level access to exploit a path traversal vulnerability to delete arbitrary files on the hosting server. The vulnerability does not require elevated privileges beyond basic authentication, nor does it require user interaction, making it easier to exploit remotely. The attack vector is network-based, and the vulnerability impacts availability by enabling attackers to disrupt website functionality or delete critical files. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a significant threat. The CVSS v3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) reflects a high severity due to the potential for denial of service through file deletion, with no impact on confidentiality or integrity directly. The vulnerability was published on June 7, 2024, and is tracked under CWE-862 (Missing Authorization).
Potential Impact
The primary impact of CVE-2024-5637 is on the availability of affected WordPress sites using the Market Exporter plugin. Attackers with minimal privileges can delete arbitrary files, potentially leading to website downtime, loss of critical data, or corruption of the WordPress installation. This can disrupt business operations, especially for e-commerce or content-driven sites relying on this plugin for exporting market data. The lack of proper authorization checks means that even low-privilege users or compromised subscriber accounts can cause significant damage. While confidentiality and integrity are not directly affected, the deletion of files can indirectly lead to data loss and service interruptions, which may result in reputational damage and financial losses. Organizations may face increased recovery costs and operational delays. The vulnerability also increases the attack surface for further exploitation if critical system files are deleted, potentially enabling privilege escalation or further compromise.
Mitigation Recommendations
To mitigate CVE-2024-5637, organizations should immediately update the Market Exporter plugin to a patched version once available from the vendor. In the absence of an official patch, administrators should restrict plugin usage to trusted users only, removing Subscriber-level or higher access from untrusted accounts. Implement strict user role management and audit existing user permissions to minimize exposure. Employ Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the 'remove_files' function or related plugin endpoints. Regularly back up website files and databases to enable rapid recovery in case of file deletion. Monitor server logs for suspicious activity indicative of exploitation attempts. Additionally, consider disabling or removing the Market Exporter plugin if it is not essential to reduce the attack surface. Finally, apply the principle of least privilege to all WordPress user roles and enforce strong authentication mechanisms to prevent account compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-5637: CWE-862 Missing Authorization in vanyukov Market Exporter
Description
CVE-2024-5637 is a high-severity vulnerability in the vanyukov Market Exporter WordPress plugin (up to version 2. 0. 19) that allows authenticated users with Subscriber-level access or higher to delete arbitrary files on the server via a missing authorization check in the 'remove_files' function. The flaw enables path traversal attacks leading to unauthorized file deletion without requiring elevated privileges beyond basic authentication. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to website availability and data integrity. Exploitation requires no user interaction and can be performed remotely over the network. Organizations using this plugin should prioritize patching or applying mitigations immediately to prevent potential service disruption or data loss. Countries with large WordPress user bases and e-commerce activity are most at risk. The CVSS score is 7. 5, reflecting high impact on availability with low attack complexity and no user interaction needed.
AI-Powered Analysis
Technical Analysis
CVE-2024-5637 is a vulnerability identified in the Market Exporter plugin for WordPress, developed by vanyukov, affecting all versions up to and including 2.0.19. The core issue is a missing authorization check (CWE-862) on the 'remove_files' function, which fails to verify whether the authenticated user has the necessary capabilities to perform file deletion operations. This allows any authenticated user with at least Subscriber-level access to exploit a path traversal vulnerability to delete arbitrary files on the hosting server. The vulnerability does not require elevated privileges beyond basic authentication, nor does it require user interaction, making it easier to exploit remotely. The attack vector is network-based, and the vulnerability impacts availability by enabling attackers to disrupt website functionality or delete critical files. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a significant threat. The CVSS v3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) reflects a high severity due to the potential for denial of service through file deletion, with no impact on confidentiality or integrity directly. The vulnerability was published on June 7, 2024, and is tracked under CWE-862 (Missing Authorization).
Potential Impact
The primary impact of CVE-2024-5637 is on the availability of affected WordPress sites using the Market Exporter plugin. Attackers with minimal privileges can delete arbitrary files, potentially leading to website downtime, loss of critical data, or corruption of the WordPress installation. This can disrupt business operations, especially for e-commerce or content-driven sites relying on this plugin for exporting market data. The lack of proper authorization checks means that even low-privilege users or compromised subscriber accounts can cause significant damage. While confidentiality and integrity are not directly affected, the deletion of files can indirectly lead to data loss and service interruptions, which may result in reputational damage and financial losses. Organizations may face increased recovery costs and operational delays. The vulnerability also increases the attack surface for further exploitation if critical system files are deleted, potentially enabling privilege escalation or further compromise.
Mitigation Recommendations
To mitigate CVE-2024-5637, organizations should immediately update the Market Exporter plugin to a patched version once available from the vendor. In the absence of an official patch, administrators should restrict plugin usage to trusted users only, removing Subscriber-level or higher access from untrusted accounts. Implement strict user role management and audit existing user permissions to minimize exposure. Employ Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the 'remove_files' function or related plugin endpoints. Regularly back up website files and databases to enable rapid recovery in case of file deletion. Monitor server logs for suspicious activity indicative of exploitation attempts. Additionally, consider disabling or removing the Market Exporter plugin if it is not essential to reduce the attack surface. Finally, apply the principle of least privilege to all WordPress user roles and enforce strong authentication mechanisms to prevent account compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-06-04T15:22:44.778Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bedb7ef31ef0b55cacb
Added to database: 2/25/2026, 9:38:53 PM
Last enriched: 2/26/2026, 2:43:52 AM
Last updated: 2/26/2026, 11:13:34 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.