Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5768: CWE-862 Missing Authorization in surakrai MIMO Woocommerce Order Tracking

0
Medium
VulnerabilityCVE-2024-5768cvecve-2024-5768cwe-862
Published: Wed Jun 19 2024 (06/19/2024, 03:12:32 UTC)
Source: CVE Database V5
Vendor/Project: surakrai
Product: MIMO Woocommerce Order Tracking

Description

CVE-2024-5768 is a medium severity vulnerability in the MIMO Woocommerce Order Tracking WordPress plugin, affecting all versions up to 1. 0. 2. The flaw arises from a missing authorization check in the 'mimo_update_provider' function, allowing authenticated users with Subscriber-level access or higher to modify shipping provider data. This unauthorized modification can include injecting stored cross-site scripting (XSS) payloads, potentially leading to client-side attacks. Exploitation requires no user interaction beyond authentication, and the vulnerability impacts confidentiality and integrity without affecting availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize implementing strict capability checks and updating or patching the plugin once available to prevent unauthorized data manipulation and XSS risks.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:49:01 UTC

Technical Analysis

The vulnerability identified as CVE-2024-5768 affects the MIMO Woocommerce Order Tracking plugin for WordPress, specifically versions up to and including 1.0.2. The root cause is a missing authorization (capability) check in the 'mimo_update_provider' function, which is responsible for updating shipping provider information. Due to this missing check, any authenticated user with at least Subscriber-level privileges can invoke this function to modify shipping provider data without proper permissions. This unauthorized access allows attackers to alter shipping information and inject stored cross-site scripting (XSS) payloads, which can execute malicious scripts in the context of other users viewing the affected data. The vulnerability is classified under CWE-862 (Missing Authorization) and has a CVSS v3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based (remote), with low attack complexity, requiring privileges (authenticated user), no user interaction, and a scope change due to the potential impact on other users. The confidentiality and integrity of the data are impacted, while availability remains unaffected. No patches or known exploits have been reported at the time of disclosure. This vulnerability is significant because WordPress and WooCommerce are widely used platforms, and plugins often extend their functionality, making them attractive targets for attackers seeking to escalate privileges or inject malicious content.

Potential Impact

The vulnerability allows authenticated users with minimal privileges (Subscriber-level) to modify shipping provider information, which can lead to unauthorized data manipulation and stored XSS attacks. This can compromise the confidentiality of user data by executing malicious scripts in the browsers of administrators or other users viewing the shipping information, potentially leading to session hijacking, credential theft, or further exploitation within the WordPress environment. The integrity of order tracking data is compromised, which could disrupt business operations or customer trust. Although availability is not directly impacted, the indirect effects of injected scripts could degrade user experience or lead to further compromise. Organizations relying on this plugin for e-commerce order tracking risk reputational damage, customer data exposure, and potential regulatory consequences if exploited. The medium CVSS score reflects the balance between the ease of exploitation (authenticated users only) and the significant impact on data integrity and confidentiality.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and restrict user roles and permissions, ensuring that only trusted users have Subscriber-level or higher access. Implement strict capability checks in the plugin code, particularly adding authorization verification in the 'mimo_update_provider' function to confirm that only users with appropriate administrative privileges can update shipping provider information. Monitor and audit plugin updates from the vendor and apply patches as soon as they become available. In the interim, consider disabling or removing the MIMO Woocommerce Order Tracking plugin if it is not essential. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious POST requests targeting the vulnerable function. Additionally, conduct regular security assessments and code reviews of third-party plugins to identify and remediate missing authorization issues proactively. Educate site administrators about the risks of granting excessive privileges to users and enforce the principle of least privilege.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-07T22:46:19.101Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bf1b7ef31ef0b55cda4

Added to database: 2/25/2026, 9:38:57 PM

Last enriched: 2/26/2026, 2:49:01 AM

Last updated: 2/26/2026, 8:02:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats