Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9583: CWE-862 Missing Authorization in jeangalea RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging

0
Medium
VulnerabilityCVE-2024-9583cvecve-2024-9583cwe-862
Published: Wed Oct 23 2024 (10/23/2024, 06:45:05 UTC)
Source: CVE Database V5
Vendor/Project: jeangalea
Product: RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging

Description

CVE-2024-9583 is a medium-severity vulnerability in the WordPress plugin 'RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging' by jeangalea. The flaw is due to a missing authorization check in the wprss_ajax_send_premium_support function, allowing authenticated users with Subscriber-level access or higher to send premium support requests with attacker-controlled subject lines and email addresses. This can lead to impersonation of the site owner when contacting support and potential leakage of license information. The vulnerability affects all versions up to and including 4. 23. 12. Exploitation does not require user interaction but does require authentication at a low privilege level. No known exploits are currently reported in the wild. The CVSS score is 4. 3, reflecting limited confidentiality impact and no integrity or availability impact.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:25:44 UTC

Technical Analysis

The vulnerability identified as CVE-2024-9583 affects the WordPress plugin 'RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging' developed by jeangalea. It arises from a missing authorization (CWE-862) in the function wprss_ajax_send_premium_support, which fails to verify whether the authenticated user has the necessary capabilities to send premium support requests. This flaw allows any authenticated user with at least Subscriber-level privileges to invoke this function and send support requests with arbitrary subject lines and email addresses. Consequently, an attacker can impersonate the legitimate site owner when communicating with the plugin's support team. Additionally, the vulnerability may expose license information, potentially aiding further attacks or unauthorized use. The vulnerability affects all plugin versions up to 4.23.12. The attack vector is remote over the network (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality to a limited extent (C:L), but does not affect integrity or availability. No patches or exploits are currently publicly available, but the flaw is published and known since October 2024.

Potential Impact

The primary impact of this vulnerability is the unauthorized use of functionality by low-privileged authenticated users, which can lead to impersonation of the site owner when contacting premium support. This can undermine trust between the site owner and the plugin vendor's support team and may facilitate social engineering or phishing attacks. Leakage of license information could enable attackers to misuse or redistribute licenses fraudulently, potentially causing financial loss or service disruption for legitimate users. Although the vulnerability does not directly affect site integrity or availability, the ability to impersonate the site owner could be leveraged in more complex attack chains. Organizations using this plugin on WordPress sites, especially those with multiple user roles including Subscribers, are at risk. The impact is mostly reputational and operational rather than catastrophic, but it can be significant for businesses relying on premium support for critical plugin functionality.

Mitigation Recommendations

To mitigate this vulnerability, site administrators should immediately update the RSS Aggregator plugin to a version that includes proper authorization checks once a patch is released by the vendor. Until then, restrict Subscriber-level user accounts or lower privileges from accessing the premium support functionality by disabling or limiting the plugin's AJAX endpoints via web application firewall (WAF) rules or custom code. Implement strict role-based access controls to minimize the number of users with authenticated access at Subscriber level or higher. Monitor outgoing support requests for unusual or suspicious content that could indicate exploitation attempts. Additionally, consider isolating or sandboxing the WordPress environment to limit the impact of compromised low-privilege accounts. Regularly audit user roles and permissions to ensure they align with the principle of least privilege. Finally, maintain communication with the plugin vendor for timely patch releases and security advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-10-07T15:36:07.784Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b52b7ef31ef0b552285

Added to database: 2/25/2026, 9:36:18 PM

Last enriched: 2/25/2026, 11:25:44 PM

Last updated: 2/26/2026, 8:10:20 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats