Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6755: CWE-862 Missing Authorization in WPWeb Social Auto Poster

0
Medium
VulnerabilityCVE-2024-6755cvecve-2024-6755cwe-862
Published: Wed Jul 24 2024 (07/24/2024, 02:33:57 UTC)
Source: CVE Database V5
Vendor/Project: WPWeb
Product: Social Auto Poster

Description

CVE-2024-6755 is a medium-severity vulnerability in the WPWeb Social Auto Poster WordPress plugin, affecting all versions up to 5. 3. 14. The flaw stems from a missing authorization check in the 'wpw_auto_poster_quick_delete_multiple' function, allowing unauthenticated attackers to delete arbitrary posts. Exploitation requires no authentication or user interaction and can lead to loss of data and disruption of website content. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin. Organizations relying on this plugin should prioritize patching or applying mitigations to prevent unauthorized content deletion. The threat primarily affects countries with high WordPress usage and significant adoption of this plugin, including the United States, India, Brazil, Germany, and the United Kingdom.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:23:25 UTC

Technical Analysis

CVE-2024-6755 is a vulnerability identified in the WPWeb Social Auto Poster plugin for WordPress, present in all versions up to and including 5.3.14. The core issue is a missing capability check (authorization) in the function 'wpw_auto_poster_quick_delete_multiple', which is responsible for deleting multiple posts quickly. Due to this missing authorization, unauthenticated attackers can invoke this function remotely without any privileges, enabling them to delete arbitrary posts from the affected WordPress sites. The vulnerability is classified under CWE-862 (Missing Authorization) and has a CVSS v3.1 base score of 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit. The impact affects integrity and availability by allowing unauthorized deletion of content, but confidentiality is not impacted. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. However, the potential for data loss and disruption to website operations is significant, especially for sites relying heavily on the Social Auto Poster plugin for content management and social media automation.

Potential Impact

The vulnerability allows unauthenticated attackers to delete arbitrary posts on affected WordPress sites, leading to potential data loss and disruption of website content integrity and availability. This can damage the reputation of organizations, cause operational downtime, and require costly recovery efforts. For businesses relying on WordPress for content delivery and marketing automation, such unauthorized deletions can interrupt workflows and social media campaigns. The ease of exploitation (no authentication or user interaction required) increases the risk of automated attacks or mass exploitation attempts. While confidentiality is not directly impacted, the loss of data and service availability can have significant indirect consequences, including loss of customer trust and potential financial losses. Organizations with large or high-traffic WordPress sites are particularly vulnerable to reputational damage and operational impact.

Mitigation Recommendations

1. Immediate mitigation involves disabling or uninstalling the Social Auto Poster plugin until a security patch is released. 2. Monitor WordPress logs and web server access logs for suspicious POST requests targeting the 'wpw_auto_poster_quick_delete_multiple' function or related endpoints. 3. Implement Web Application Firewall (WAF) rules to block unauthorized access to plugin-specific AJAX or admin endpoints, especially those related to post deletion. 4. Restrict access to WordPress admin-ajax.php and other plugin endpoints by IP whitelisting or authentication where feasible. 5. Regularly back up WordPress content and database to enable quick restoration in case of unauthorized deletions. 6. Follow WPWeb and WordPress security advisories closely for official patches or updates and apply them promptly. 7. Consider employing security plugins that enforce capability checks and monitor unauthorized changes to posts. 8. Educate site administrators about the risks of installing plugins without proper security reviews and encourage minimal plugin usage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-07-15T13:02:24.665Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c0cb7ef31ef0b55f549

Added to database: 2/25/2026, 9:39:24 PM

Last enriched: 2/26/2026, 3:23:25 AM

Last updated: 2/26/2026, 9:37:58 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats