Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6799: CWE-862 Missing Authorization in yithemes YITH Essential Kit for WooCommerce #1

0
Medium
VulnerabilityCVE-2024-6799cvecve-2024-6799cwe-862
Published: Fri Jul 19 2024 (07/19/2024, 07:36:45 UTC)
Source: CVE Database V5
Vendor/Project: yithemes
Product: YITH Essential Kit for WooCommerce #1

Description

CVE-2024-6799 is a medium severity vulnerability in the YITH Essential Kit for WooCommerce #1 WordPress plugin that allows authenticated users with Subscriber-level access or higher to install, activate, or deactivate certain YITH plugins without proper authorization checks. The flaw arises from missing capability checks on critical functions such as 'activate_module', 'deactivate_module', and 'install_module' in all versions up to 2. 34. 0. Exploitation does not require user interaction and can be performed remotely over the network. While the vulnerability does not directly impact confidentiality or availability, it allows unauthorized modification of plugin states, potentially leading to privilege escalation or further compromise. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or implementing access restrictions to mitigate risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:24:43 UTC

Technical Analysis

The vulnerability identified as CVE-2024-6799 affects the YITH Essential Kit for WooCommerce #1 plugin for WordPress, specifically versions up to and including 2.34.0. The root cause is a missing authorization check (CWE-862) on the functions responsible for managing YITH plugins: 'activate_module', 'deactivate_module', and 'install_module'. These functions fail to verify whether the authenticated user has the necessary capabilities before allowing these actions. As a result, any authenticated user with at least Subscriber-level privileges can exploit this flaw to install, activate, or deactivate plugins from a predefined list of YITH plugins. This unauthorized modification of plugin states can lead to privilege escalation if malicious plugins are activated or security controls are bypassed. The vulnerability is remotely exploitable without user interaction, with a CVSS 3.1 base score of 4.3, reflecting low complexity and limited impact on confidentiality and availability but moderate impact on integrity. No patches are currently linked, and no known exploits have been observed in the wild. The vulnerability was publicly disclosed on July 19, 2024, by Wordfence.

Potential Impact

The primary impact of CVE-2024-6799 is unauthorized modification of plugin states within WordPress sites using the affected YITH Essential Kit for WooCommerce #1 plugin. Attackers with low-level authenticated access (Subscriber or higher) can activate or deactivate plugins, potentially enabling malicious plugins or disabling security-related plugins. This can lead to privilege escalation, unauthorized access to sensitive data, or disruption of site functionality. Although the vulnerability does not directly expose confidential information or cause denial of service, the integrity of the WordPress environment is compromised, increasing the risk of further exploitation. E-commerce sites using WooCommerce and YITH plugins are particularly at risk, as attackers could manipulate payment or product modules. The lack of user interaction and ease of exploitation make this vulnerability a significant concern for organizations relying on these plugins for their online stores.

Mitigation Recommendations

To mitigate CVE-2024-6799, organizations should immediately update the YITH Essential Kit for WooCommerce #1 plugin once an official patch is released. In the absence of a patch, administrators should restrict plugin management capabilities strictly to trusted roles by implementing custom capability checks or using role management plugins to limit Subscriber-level users from accessing plugin activation or installation functions. Additionally, monitoring and logging plugin state changes can help detect unauthorized modifications. Employing Web Application Firewalls (WAFs) with rules to detect unusual plugin management requests can provide an additional layer of defense. Regularly auditing user roles and permissions to ensure least privilege principles are enforced will reduce the attack surface. Finally, educating site administrators about this vulnerability and encouraging timely updates and backups will help maintain site integrity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-07-16T18:59:38.502Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c0cb7ef31ef0b55f561

Added to database: 2/25/2026, 9:39:24 PM

Last enriched: 2/26/2026, 3:24:43 AM

Last updated: 2/26/2026, 8:04:37 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats