Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9705: CWE-862 Missing Authorization in rstheme2017 Ultimate Coming Soon & Maintenance

0
Medium
VulnerabilityCVE-2024-9705cvecve-2024-9705cwe-862
Published: Fri Dec 06 2024 (12/06/2024, 08:24:51 UTC)
Source: CVE Database V5
Vendor/Project: rstheme2017
Product: Ultimate Coming Soon & Maintenance

Description

CVE-2024-9705 is a medium-severity vulnerability in the Ultimate Coming Soon & Maintenance WordPress plugin by rstheme2017. It arises from a missing authorization check in the 'ucsm_update_template_name_lite' function, allowing authenticated users with Subscriber-level access or higher to modify the plugin's template names. This vulnerability does not impact confidentiality or availability but allows integrity modification of plugin data. Exploitation requires no user interaction and can be performed remotely over the network. Although no known exploits are currently reported in the wild, the flaw affects all versions up to 1. 0. 9. Organizations using this plugin should prioritize patching or applying access restrictions to mitigate unauthorized template modifications. Countries with significant WordPress usage and large web hosting markets are most at risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:34:29 UTC

Technical Analysis

CVE-2024-9705 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Ultimate Coming Soon & Maintenance plugin for WordPress developed by rstheme2017. The issue stems from the absence of a proper capability check in the 'ucsm_update_template_name_lite' function, which is responsible for updating the names of the plugin's templates. This flaw allows any authenticated user with at least Subscriber-level privileges to modify template names without further authorization. Since WordPress roles such as Subscriber are typically assigned to low-privilege users, this vulnerability broadens the attack surface by enabling unauthorized data modification from less trusted users. The vulnerability affects all plugin versions up to and including 1.0.9. The CVSS v3.1 base score is 4.3 (medium), reflecting the low impact on confidentiality and availability but a measurable impact on integrity. The attack vector is network-based, requiring authentication but no user interaction. No patches or exploit code are currently publicly available, but the vulnerability is published and should be addressed promptly. This vulnerability could be leveraged to alter the plugin’s behavior or appearance, potentially facilitating further attacks or defacement.

Potential Impact

The primary impact of CVE-2024-9705 is unauthorized modification of plugin template names, which affects data integrity. While this does not directly compromise sensitive information or system availability, it can undermine the trustworthiness and proper functioning of the affected WordPress site. Attackers with Subscriber-level access could manipulate templates to mislead site visitors or administrators, potentially enabling social engineering or facilitating more complex attacks if combined with other vulnerabilities. For organizations relying on the Ultimate Coming Soon & Maintenance plugin to manage site maintenance or launch pages, this could disrupt planned communications or branding. The scope is limited to sites using this specific plugin version, but given WordPress’s widespread use, the potential reach is significant. The vulnerability requires authenticated access, limiting exploitation to users who already have some level of access, but Subscriber roles are commonly assigned to registered users, increasing risk in multi-user environments.

Mitigation Recommendations

To mitigate CVE-2024-9705, organizations should immediately update the Ultimate Coming Soon & Maintenance plugin to a patched version once available. In the absence of an official patch, administrators should restrict user roles to minimize Subscriber-level access or higher for untrusted users. Implementing strict role-based access control (RBAC) and auditing user permissions can reduce the risk of exploitation. Additionally, monitoring and logging changes to plugin templates can help detect unauthorized modifications early. Web application firewalls (WAFs) with custom rules to detect unusual POST requests targeting the vulnerable function may provide temporary protection. Site administrators should also educate users about the risks of elevated privileges and review plugin usage to determine if alternative plugins with better security practices are available. Regular backups of site configurations and templates will aid in recovery if unauthorized changes occur.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-10-09T18:54:14.965Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b59b7ef31ef0b5548c3

Added to database: 2/25/2026, 9:36:25 PM

Last enriched: 2/25/2026, 11:34:29 PM

Last updated: 2/26/2026, 7:00:37 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats