CVE-2024-6010: CWE-472 External Control of Assumed-Immutable Web Parameter in StylemixThemes Cost Calculator Builder PRO
CVE-2024-6010 is a medium-severity vulnerability in the StylemixThemes Cost Calculator Builder PRO WordPress plugin, affecting all versions up to 3. 2. 1. It allows unauthenticated attackers to manipulate the price field in orders submitted via the calculator due to insufficient validation in the 'create_cc_order' function. This price manipulation can lead to integrity issues, enabling attackers to submit orders with altered prices without authentication or user interaction. Although a partial patch was released in version 3. 2. 17, earlier versions remain vulnerable. The vulnerability has a CVSS score of 5. 3, reflecting its moderate impact and ease of exploitation.
AI Analysis
Technical Summary
CVE-2024-6010 is a vulnerability classified under CWE-472 (External Control of Assumed-Immutable Web Parameter) found in the Cost Calculator Builder PRO plugin for WordPress developed by StylemixThemes. The flaw exists in all versions up to and including 3.2.1, where the plugin's 'create_cc_order' function fails to properly validate the price field submitted via the cost calculator interface. This improper validation allows unauthenticated attackers to externally manipulate the price parameter before it is processed, effectively enabling them to submit orders with arbitrary prices. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The partial patch released in version 3.2.17 addresses some aspects of the issue, but earlier versions remain vulnerable. The CVSS 3.1 base score of 5.3 reflects a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects integrity (I:L) but not confidentiality or availability. This vulnerability can be leveraged to conduct price manipulation attacks, potentially leading to financial losses and undermining trust in affected e-commerce or service platforms using this plugin.
Potential Impact
The primary impact of CVE-2024-6010 is the integrity compromise of order pricing in websites using the Cost Calculator Builder PRO plugin. Attackers can submit orders with manipulated prices, potentially paying less than intended or bypassing pricing rules. This can lead to direct financial losses for businesses relying on the plugin for price calculations, especially in e-commerce, service quoting, or booking platforms. The vulnerability does not affect confidentiality or availability, so data breaches or denial of service are not immediate concerns. However, repeated exploitation could result in significant revenue loss, customer trust erosion, and reputational damage. Organizations may also face challenges in transaction reconciliation and fraud detection. Since the vulnerability is exploitable without authentication or user interaction, the attack surface is broad, increasing the likelihood of exploitation if unpatched. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often reverse-engineer patches to develop exploits.
Mitigation Recommendations
To mitigate CVE-2024-6010, organizations should immediately update the Cost Calculator Builder PRO plugin to version 3.2.17 or later, where partial patches have been applied. Given the partial nature of the patch, it is advisable to monitor vendor communications for further updates or full fixes. Additionally, implement server-side validation of all price-related input parameters to ensure they conform to expected ranges and formats before processing orders. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests manipulating price fields. Enable detailed logging and monitoring of order submissions to identify anomalous pricing patterns indicative of exploitation attempts. Consider restricting access to the calculator endpoints via IP whitelisting or CAPTCHA challenges to reduce automated abuse. Conduct regular security audits and penetration testing focused on input validation and business logic flaws in e-commerce workflows. Finally, educate development teams on secure coding practices to prevent similar vulnerabilities in future plugin customizations or integrations.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Brazil, Netherlands, Japan, Italy
CVE-2024-6010: CWE-472 External Control of Assumed-Immutable Web Parameter in StylemixThemes Cost Calculator Builder PRO
Description
CVE-2024-6010 is a medium-severity vulnerability in the StylemixThemes Cost Calculator Builder PRO WordPress plugin, affecting all versions up to 3. 2. 1. It allows unauthenticated attackers to manipulate the price field in orders submitted via the calculator due to insufficient validation in the 'create_cc_order' function. This price manipulation can lead to integrity issues, enabling attackers to submit orders with altered prices without authentication or user interaction. Although a partial patch was released in version 3. 2. 17, earlier versions remain vulnerable. The vulnerability has a CVSS score of 5. 3, reflecting its moderate impact and ease of exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2024-6010 is a vulnerability classified under CWE-472 (External Control of Assumed-Immutable Web Parameter) found in the Cost Calculator Builder PRO plugin for WordPress developed by StylemixThemes. The flaw exists in all versions up to and including 3.2.1, where the plugin's 'create_cc_order' function fails to properly validate the price field submitted via the cost calculator interface. This improper validation allows unauthenticated attackers to externally manipulate the price parameter before it is processed, effectively enabling them to submit orders with arbitrary prices. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The partial patch released in version 3.2.17 addresses some aspects of the issue, but earlier versions remain vulnerable. The CVSS 3.1 base score of 5.3 reflects a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects integrity (I:L) but not confidentiality or availability. This vulnerability can be leveraged to conduct price manipulation attacks, potentially leading to financial losses and undermining trust in affected e-commerce or service platforms using this plugin.
Potential Impact
The primary impact of CVE-2024-6010 is the integrity compromise of order pricing in websites using the Cost Calculator Builder PRO plugin. Attackers can submit orders with manipulated prices, potentially paying less than intended or bypassing pricing rules. This can lead to direct financial losses for businesses relying on the plugin for price calculations, especially in e-commerce, service quoting, or booking platforms. The vulnerability does not affect confidentiality or availability, so data breaches or denial of service are not immediate concerns. However, repeated exploitation could result in significant revenue loss, customer trust erosion, and reputational damage. Organizations may also face challenges in transaction reconciliation and fraud detection. Since the vulnerability is exploitable without authentication or user interaction, the attack surface is broad, increasing the likelihood of exploitation if unpatched. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often reverse-engineer patches to develop exploits.
Mitigation Recommendations
To mitigate CVE-2024-6010, organizations should immediately update the Cost Calculator Builder PRO plugin to version 3.2.17 or later, where partial patches have been applied. Given the partial nature of the patch, it is advisable to monitor vendor communications for further updates or full fixes. Additionally, implement server-side validation of all price-related input parameters to ensure they conform to expected ranges and formats before processing orders. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests manipulating price fields. Enable detailed logging and monitoring of order submissions to identify anomalous pricing patterns indicative of exploitation attempts. Consider restricting access to the calculator endpoints via IP whitelisting or CAPTCHA challenges to reduce automated abuse. Conduct regular security audits and penetration testing focused on input validation and business logic flaws in e-commerce workflows. Finally, educate development teams on secure coding practices to prevent similar vulnerabilities in future plugin customizations or integrations.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-06-14T16:33:02.308Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bfab7ef31ef0b55d3ef
Added to database: 2/25/2026, 9:39:06 PM
Last enriched: 2/26/2026, 2:59:53 AM
Last updated: 2/26/2026, 6:17:16 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.