Cyber Posture

CVE-2024-10591

High

Published: 30 January 2025

Published
30 January 2025
Modified
08 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 29.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-10591 is a high-severity Missing Authorization (CWE-862) vulnerability in Makewebbetter Hubspot For Woocommerce. Its CVSS base score is 8.8 (High).

Operationally, ranked at the 29.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations and capability checks to prevent unauthorized low-privileged users from modifying arbitrary WordPress options.

prevent

Applies least privilege principle to restrict Contributor-level users from performing privilege-escalating actions like updating default user roles.

prevent

Mandates timely flaw remediation through patching the vulnerable plugin function to include missing capability checks.

NVD Description

The MWB HubSpot for WooCommerce – CRM, Abandoned Cart, Email Marketing, Marketing Automation & Analytics plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hubwoo_save_updates()…

more

function in all versions up to, and including, 1.5.9. This makes it possible for authenticated attackers, with Contributor-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

Deeper analysisAI

CVE-2024-10591 affects the MWB HubSpot for WooCommerce – CRM, Abandoned Cart, Email Marketing, Marketing Automation & Analytics plugin for WordPress in all versions up to and including 1.5.9. The vulnerability stems from a missing capability check on the hubwoo_save_updates() function, enabling unauthorized modification of data that can lead to privilege escalation, as classified under CWE-862. It has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-01-30.

Authenticated attackers with Contributor-level access or higher can exploit this issue remotely without user interaction. By calling the vulnerable function, they can update arbitrary WordPress options, such as changing the default role for new user registrations to administrator and enabling user registration. This allows attackers to create administrative accounts and gain full control over the site.

Advisories reference the vulnerable code in class-hubwoo-ajax-handler.php at line 845, a patch in changeset 3231984, and Wordfence threat intelligence detailing the issue. Security practitioners should update to a patched version beyond 1.5.9 to mitigate the risk.

Details

CWE(s)

Affected Products

makewebbetter
hubspot for woocommerce
≤ 1.6.0

CVEs Like This One

CVE-2025-14457Same product class: WordPress / CMS plugin
CVE-2024-12129Same product class: WordPress / CMS plugin
CVE-2025-24618Same product class: WordPress / CMS plugin
CVE-2025-24596Same product class: WordPress / CMS plugin
CVE-2025-2328Same product class: WordPress / CMS plugin
CVE-2025-22786Same product class: WordPress / CMS plugin
CVE-2024-13921Same product class: WordPress / CMS plugin
CVE-2025-1323Same product class: WordPress / CMS plugin
CVE-2024-13875Same product class: WordPress / CMS plugin
CVE-2024-13359Same product class: WordPress / CMS plugin

References