Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6754: CWE-862 Missing Authorization in WPWeb Social Auto Poster

0
Medium
VulnerabilityCVE-2024-6754cvecve-2024-6754cwe-862
Published: Wed Jul 24 2024 (07/24/2024, 02:33:56 UTC)
Source: CVE Database V5
Vendor/Project: WPWeb
Product: Social Auto Poster

Description

CVE-2024-6754 is a medium severity vulnerability in the WPWeb Social Auto Poster WordPress plugin affecting all versions up to 5. 3. 14. It involves a missing authorization check in the 'wpw_auto_poster_update_tweet_template' function, allowing authenticated users with Subscriber-level access or higher to modify arbitrary post metadata. This can lead to integrity and availability impacts on the affected WordPress sites. Exploitation does not require user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or implementing access controls to mitigate unauthorized data modifications. The vulnerability primarily affects WordPress sites globally, with higher risk in countries where WordPress and this plugin have significant market penetration. The CVSS score is 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:23:12 UTC

Technical Analysis

CVE-2024-6754 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WPWeb Social Auto Poster plugin for WordPress. The flaw exists due to the absence of proper capability checks in the 'wpw_auto_poster_update_tweet_template' function, which is responsible for updating tweet templates used by the plugin. This missing authorization allows any authenticated user with at least Subscriber-level privileges to update arbitrary post metadata. Since Subscribers typically have limited permissions, this vulnerability effectively escalates their ability to modify content-related data beyond intended limits. The vulnerability affects all versions up to and including 5.3.14 of the plugin. The CVSS v3.1 base score is 5.4, indicating a medium severity with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L, meaning it is remotely exploitable over the network with low attack complexity, requires low privileges, no user interaction, and impacts integrity and availability but not confidentiality. No patches or fixes have been linked yet, and no known exploits are reported in the wild. The vulnerability could be leveraged to alter post metadata, potentially disrupting site content, automated social media postings, or causing denial of service conditions related to content management.

Potential Impact

The primary impact of CVE-2024-6754 is unauthorized modification of post metadata on WordPress sites using the vulnerable Social Auto Poster plugin. This can compromise data integrity by allowing attackers with minimal privileges to alter content-related information, potentially defacing posts, manipulating social media auto-posting behavior, or corrupting metadata that affects site functionality. Availability may also be impacted if the metadata changes disrupt plugin operations or cause errors in content delivery. Although confidentiality is not directly affected, the integrity and availability impacts can degrade user trust and site reliability. For organizations relying on automated social media posting for marketing or communication, this could lead to reputational damage or operational disruptions. The ease of exploitation combined with the widespread use of WordPress and this plugin increases the risk of targeted attacks, especially in environments where user privilege separation is weak or where many users have Subscriber-level access.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the use of the WPWeb Social Auto Poster plugin and verify the version in use. Until an official patch is released, administrators should restrict Subscriber-level user permissions to the minimum necessary and consider temporarily disabling the plugin if feasible. Implementing strict role-based access controls and monitoring changes to post metadata can help detect and prevent unauthorized modifications. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting the vulnerable function. Additionally, site owners should keep WordPress core and all plugins updated regularly and subscribe to vendor security advisories for timely patch deployment once available. Employing security plugins that monitor file and database changes can provide early warnings of exploitation attempts. Finally, educating users about the risks of privilege misuse and enforcing strong authentication policies will reduce the likelihood of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-07-15T13:02:12.337Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c0cb7ef31ef0b55f545

Added to database: 2/25/2026, 9:39:24 PM

Last enriched: 2/26/2026, 3:23:12 AM

Last updated: 2/26/2026, 8:02:49 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats