Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7856: CWE-862 Missing Authorization in sonaar MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar

0
Critical
VulnerabilityCVE-2024-7856cvecve-2024-7856cwe-862
Published: Thu Aug 29 2024 (08/29/2024, 03:52:57 UTC)
Source: CVE Database V5
Vendor/Project: sonaar
Product: MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar

Description

CVE-2024-7856 is a critical vulnerability in the Sonaar MP3 Audio Player WordPress plugin that allows authenticated users with subscriber-level access or higher to delete arbitrary files on the server. The flaw arises from missing authorization checks on the removeTempFiles() function and inadequate validation of the 'file' parameter, enabling unauthorized file deletion. Exploiting this vulnerability can lead to deletion of critical files such as wp-config. php, potentially allowing remote code execution. The vulnerability affects all versions up to and including 5. 7. 0. 1. It has a high CVSS score of 9. 1, indicating severe impact with network attack vector, low attack complexity, and no user interaction required.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:50:03 UTC

Technical Analysis

CVE-2024-7856 is a critical missing authorization vulnerability (CWE-862) in the Sonaar MP3 Audio Player – Music Player, Podcast Player & Radio WordPress plugin. The vulnerability stems from a lack of proper capability checks in the removeTempFiles() function combined with insufficient validation of the 'file' parameter. This allows authenticated users with minimal privileges (subscriber-level or higher) to delete arbitrary files on the web server. Since WordPress relies heavily on the integrity of configuration files like wp-config.php, deleting such files can disrupt site functionality and enable attackers to execute remote code by forcing WordPress into insecure states or triggering fallback behaviors. The vulnerability affects all versions up to 5.7.0.1 and has a CVSS 3.1 base score of 9.1, reflecting its critical severity. The attack vector is network-based with no user interaction needed, and the attack complexity is low, making exploitation straightforward once an attacker has subscriber-level access. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple user roles. The absence of patches at the time of disclosure increases the urgency for administrators to apply workarounds or restrict access until a fix is available.

Potential Impact

The impact of CVE-2024-7856 is severe for organizations using the Sonaar MP3 Audio Player plugin on WordPress sites. Unauthorized arbitrary file deletion can lead to denial of service by removing critical files, data loss, and potential remote code execution if attackers delete configuration files like wp-config.php. This can result in full site compromise, data breaches, defacement, or use of the site as a pivot point for further attacks. Since subscriber-level users can exploit this, even low-privileged accounts pose a threat, increasing the attack surface. Organizations with multi-user WordPress environments, especially those allowing subscriber or contributor roles, are at higher risk. The vulnerability can disrupt business operations, damage reputation, and incur remediation costs. Given WordPress's widespread use globally, the threat affects a broad range of industries, including media, e-commerce, and content providers relying on this plugin for audio content delivery.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following mitigations: 1) Restrict subscriber-level user capabilities by disabling or limiting plugin access to trusted users only; 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the removeTempFiles() function or containing file deletion parameters; 3) Monitor file system integrity and set up alerts for unexpected deletions, especially of critical files like wp-config.php; 4) Limit file system permissions to prevent the web server user from deleting sensitive files; 5) Regularly back up WordPress files and databases to enable quick restoration if deletion occurs; 6) Review and audit user roles and permissions to minimize unnecessary subscriber accounts; 7) Follow Sonaar plugin updates closely and apply patches immediately once available; 8) Consider temporarily disabling or replacing the vulnerable plugin if feasible to eliminate exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-15T17:01:22.836Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c20b7ef31ef0b560359

Added to database: 2/25/2026, 9:39:44 PM

Last enriched: 2/26/2026, 3:50:03 AM

Last updated: 2/26/2026, 6:14:30 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats