CVE-2024-7381: CWE-862 Missing Authorization in creativform Geo Controller
The Geo Controller plugin for WordPress is vulnerable to unauthorized shortcode execution due to missing authorization and capability checks on the ajax__shortcode_cache function in all versions up to, and including, 8.6.9. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes available on the target site.
AI Analysis
Technical Summary
CVE-2024-7381 is a missing authorization vulnerability in the Geo Controller WordPress plugin by creativform. The ajax__shortcode_cache function lacks proper authorization and capability checks, allowing unauthenticated attackers to execute arbitrary shortcodes on the target site. This affects all plugin versions up to and including 8.6.9. The vulnerability is categorized under CWE-862 and has a CVSS 3.1 base score of 5.3 (medium severity). No patches or vendor advisories indicating fixes are currently available, and no known exploits have been reported.
Potential Impact
An unauthenticated attacker can execute arbitrary shortcodes on a vulnerable WordPress site using the Geo Controller plugin. This could lead to limited impact such as information disclosure or minor site manipulation depending on the shortcodes available. The CVSS vector indicates no impact on integrity or availability, only a low impact on confidentiality. There are no known active exploits in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no patch or official fix is currently available, users should monitor for updates from creativform. As a temporary mitigation, restricting access to the ajax__shortcode_cache endpoint or disabling the Geo Controller plugin until a fix is released may reduce risk.
CVE-2024-7381: CWE-862 Missing Authorization in creativform Geo Controller
Description
The Geo Controller plugin for WordPress is vulnerable to unauthorized shortcode execution due to missing authorization and capability checks on the ajax__shortcode_cache function in all versions up to, and including, 8.6.9. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes available on the target site.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-7381 is a missing authorization vulnerability in the Geo Controller WordPress plugin by creativform. The ajax__shortcode_cache function lacks proper authorization and capability checks, allowing unauthenticated attackers to execute arbitrary shortcodes on the target site. This affects all plugin versions up to and including 8.6.9. The vulnerability is categorized under CWE-862 and has a CVSS 3.1 base score of 5.3 (medium severity). No patches or vendor advisories indicating fixes are currently available, and no known exploits have been reported.
Potential Impact
An unauthenticated attacker can execute arbitrary shortcodes on a vulnerable WordPress site using the Geo Controller plugin. This could lead to limited impact such as information disclosure or minor site manipulation depending on the shortcodes available. The CVSS vector indicates no impact on integrity or availability, only a low impact on confidentiality. There are no known active exploits in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no patch or official fix is currently available, users should monitor for updates from creativform. As a temporary mitigation, restricting access to the ajax__shortcode_cache endpoint or disabling the Geo Controller plugin until a fix is released may reduce risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-08-01T13:13:17.911Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c14b7ef31ef0b55fba5
Added to database: 2/25/2026, 9:39:32 PM
Last enriched: 4/9/2026, 3:03:53 PM
Last updated: 4/12/2026, 11:49:51 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.