CVE-2024-6799: CWE-862 Missing Authorization in yithemes YITH Essential Kit for WooCommerce #1
CVE-2024-6799 is a medium severity vulnerability in the YITH Essential Kit for WooCommerce #1 WordPress plugin that allows authenticated users with Subscriber-level access or higher to install, activate, or deactivate certain YITH plugins without proper authorization checks. The flaw arises from missing capability checks on critical functions such as 'activate_module', 'deactivate_module', and 'install_module' in all versions up to 2. 34. 0. Exploitation does not require user interaction and can be performed remotely over the network. While the vulnerability does not directly impact confidentiality or availability, it allows unauthorized modification of plugin states, potentially leading to privilege escalation or further compromise. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or implementing access restrictions to mitigate risk.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-6799 affects the YITH Essential Kit for WooCommerce #1 plugin for WordPress, specifically versions up to and including 2.34.0. The root cause is a missing authorization check (CWE-862) on the functions responsible for managing YITH plugins: 'activate_module', 'deactivate_module', and 'install_module'. These functions fail to verify whether the authenticated user has the necessary capabilities before allowing these actions. As a result, any authenticated user with at least Subscriber-level privileges can exploit this flaw to install, activate, or deactivate plugins from a predefined list of YITH plugins. This unauthorized modification of plugin states can lead to privilege escalation if malicious plugins are activated or security controls are bypassed. The vulnerability is remotely exploitable without user interaction, with a CVSS 3.1 base score of 4.3, reflecting low complexity and limited impact on confidentiality and availability but moderate impact on integrity. No patches are currently linked, and no known exploits have been observed in the wild. The vulnerability was publicly disclosed on July 19, 2024, by Wordfence.
Potential Impact
The primary impact of CVE-2024-6799 is unauthorized modification of plugin states within WordPress sites using the affected YITH Essential Kit for WooCommerce #1 plugin. Attackers with low-level authenticated access (Subscriber or higher) can activate or deactivate plugins, potentially enabling malicious plugins or disabling security-related plugins. This can lead to privilege escalation, unauthorized access to sensitive data, or disruption of site functionality. Although the vulnerability does not directly expose confidential information or cause denial of service, the integrity of the WordPress environment is compromised, increasing the risk of further exploitation. E-commerce sites using WooCommerce and YITH plugins are particularly at risk, as attackers could manipulate payment or product modules. The lack of user interaction and ease of exploitation make this vulnerability a significant concern for organizations relying on these plugins for their online stores.
Mitigation Recommendations
To mitigate CVE-2024-6799, organizations should immediately update the YITH Essential Kit for WooCommerce #1 plugin once an official patch is released. In the absence of a patch, administrators should restrict plugin management capabilities strictly to trusted roles by implementing custom capability checks or using role management plugins to limit Subscriber-level users from accessing plugin activation or installation functions. Additionally, monitoring and logging plugin state changes can help detect unauthorized modifications. Employing Web Application Firewalls (WAFs) with rules to detect unusual plugin management requests can provide an additional layer of defense. Regularly auditing user roles and permissions to ensure least privilege principles are enforced will reduce the attack surface. Finally, educating site administrators about this vulnerability and encouraging timely updates and backups will help maintain site integrity.
Affected Countries
United States, United Kingdom, Germany, France, Italy, Canada, Australia, Netherlands, Spain, Brazil
CVE-2024-6799: CWE-862 Missing Authorization in yithemes YITH Essential Kit for WooCommerce #1
Description
CVE-2024-6799 is a medium severity vulnerability in the YITH Essential Kit for WooCommerce #1 WordPress plugin that allows authenticated users with Subscriber-level access or higher to install, activate, or deactivate certain YITH plugins without proper authorization checks. The flaw arises from missing capability checks on critical functions such as 'activate_module', 'deactivate_module', and 'install_module' in all versions up to 2. 34. 0. Exploitation does not require user interaction and can be performed remotely over the network. While the vulnerability does not directly impact confidentiality or availability, it allows unauthorized modification of plugin states, potentially leading to privilege escalation or further compromise. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or implementing access restrictions to mitigate risk.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2024-6799 affects the YITH Essential Kit for WooCommerce #1 plugin for WordPress, specifically versions up to and including 2.34.0. The root cause is a missing authorization check (CWE-862) on the functions responsible for managing YITH plugins: 'activate_module', 'deactivate_module', and 'install_module'. These functions fail to verify whether the authenticated user has the necessary capabilities before allowing these actions. As a result, any authenticated user with at least Subscriber-level privileges can exploit this flaw to install, activate, or deactivate plugins from a predefined list of YITH plugins. This unauthorized modification of plugin states can lead to privilege escalation if malicious plugins are activated or security controls are bypassed. The vulnerability is remotely exploitable without user interaction, with a CVSS 3.1 base score of 4.3, reflecting low complexity and limited impact on confidentiality and availability but moderate impact on integrity. No patches are currently linked, and no known exploits have been observed in the wild. The vulnerability was publicly disclosed on July 19, 2024, by Wordfence.
Potential Impact
The primary impact of CVE-2024-6799 is unauthorized modification of plugin states within WordPress sites using the affected YITH Essential Kit for WooCommerce #1 plugin. Attackers with low-level authenticated access (Subscriber or higher) can activate or deactivate plugins, potentially enabling malicious plugins or disabling security-related plugins. This can lead to privilege escalation, unauthorized access to sensitive data, or disruption of site functionality. Although the vulnerability does not directly expose confidential information or cause denial of service, the integrity of the WordPress environment is compromised, increasing the risk of further exploitation. E-commerce sites using WooCommerce and YITH plugins are particularly at risk, as attackers could manipulate payment or product modules. The lack of user interaction and ease of exploitation make this vulnerability a significant concern for organizations relying on these plugins for their online stores.
Mitigation Recommendations
To mitigate CVE-2024-6799, organizations should immediately update the YITH Essential Kit for WooCommerce #1 plugin once an official patch is released. In the absence of a patch, administrators should restrict plugin management capabilities strictly to trusted roles by implementing custom capability checks or using role management plugins to limit Subscriber-level users from accessing plugin activation or installation functions. Additionally, monitoring and logging plugin state changes can help detect unauthorized modifications. Employing Web Application Firewalls (WAFs) with rules to detect unusual plugin management requests can provide an additional layer of defense. Regularly auditing user roles and permissions to ensure least privilege principles are enforced will reduce the attack surface. Finally, educating site administrators about this vulnerability and encouraging timely updates and backups will help maintain site integrity.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-07-16T18:59:38.502Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c0cb7ef31ef0b55f561
Added to database: 2/25/2026, 9:39:24 PM
Last enriched: 2/26/2026, 3:24:43 AM
Last updated: 2/26/2026, 8:04:37 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.