Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6491: CWE-862 Missing Authorization in jetmonsters Getwid – Gutenberg Blocks

0
Medium
VulnerabilityCVE-2024-6491cvecve-2024-6491cwe-862
Published: Sat Jul 20 2024 (07/20/2024, 06:43:45 UTC)
Source: CVE Database V5
Vendor/Project: jetmonsters
Product: Getwid – Gutenberg Blocks

Description

CVE-2024-6491 is a medium-severity vulnerability in the Getwid – Gutenberg Blocks WordPress plugin by jetmonsters, affecting all versions up to 2. 0. 10. The flaw is due to missing authorization checks on the mailchimp_api_key_manage function, allowing authenticated users with Contributor-level access or higher to modify the MailChimp API key without proper permissions. This unauthorized modification can lead to potential misuse of the MailChimp integration, impacting data integrity. Exploitation does not require user interaction and can be performed remotely. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or implementing strict access controls to mitigate risks. The vulnerability primarily affects WordPress sites using this plugin, which are widespread globally, with particular risk in countries with high WordPress adoption. The CVSS score is 4.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:12:19 UTC

Technical Analysis

CVE-2024-6491 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Getwid – Gutenberg Blocks plugin for WordPress, developed by jetmonsters. The issue arises from the absence of a capability check in the mailchimp_api_key_manage function, which is responsible for managing the MailChimp API key within the plugin. This flaw allows any authenticated user with at least Contributor-level privileges to set or modify the MailChimp API key without proper authorization. Since Contributors typically have limited permissions focused on content creation and editing, this escalation of privilege to modify plugin settings represents a significant authorization bypass. The vulnerability affects all versions up to and including 2.0.10. The CVSS v3.1 base score is 4.3, reflecting a medium severity with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, indicating network attack vector, low attack complexity, requiring privileges, no user interaction, unchanged scope, no confidentiality or availability impact, but integrity impact present. Exploitation could allow attackers to manipulate the MailChimp API key, potentially redirecting or intercepting marketing data or causing disruption in email campaign management. No patches or exploits are currently reported, but the vulnerability's presence in a widely used WordPress plugin underscores the need for prompt mitigation.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification of the MailChimp API key by users with Contributor-level access or higher. This can lead to integrity issues where attackers or unauthorized users could replace the legitimate API key with one controlled by them, potentially redirecting email marketing data, harvesting subscriber information, or disrupting email campaigns. While the vulnerability does not directly compromise confidentiality or availability, the manipulation of API keys can indirectly lead to data leakage or loss of trust in marketing communications. Organizations relying on the Getwid plugin for their WordPress sites, especially those integrating MailChimp for customer engagement, may face reputational damage and operational disruptions. Since Contributors are common roles in many WordPress sites, the attack surface is broad, increasing the likelihood of exploitation in environments where access controls are not strictly enforced.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict Contributor-level user capabilities to prevent unauthorized access to plugin settings. Implement role-based access control (RBAC) policies that limit the ability to modify plugin configurations to trusted administrators only. Monitor and audit changes to the MailChimp API key within the WordPress admin dashboard to detect unauthorized modifications. If possible, temporarily disable the Getwid plugin's MailChimp integration until a patch or update is released. Regularly update the Getwid plugin to the latest version once a fix is available. Additionally, consider implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the mailchimp_api_key_manage function. Educate site administrators and contributors about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of compromised accounts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-07-03T18:53:33.601Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c04b7ef31ef0b55f006

Added to database: 2/25/2026, 9:39:16 PM

Last enriched: 2/26/2026, 3:12:19 AM

Last updated: 2/26/2026, 9:38:47 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats