CVE-2024-10591
Published: 30 January 2025
Summary
CVE-2024-10591 is a high-severity Missing Authorization (CWE-862) vulnerability in Makewebbetter Hubspot For Woocommerce. Its CVSS base score is 8.8 (High).
Operationally, ranked at the 29.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations and capability checks to prevent unauthorized low-privileged users from modifying arbitrary WordPress options.
Applies least privilege principle to restrict Contributor-level users from performing privilege-escalating actions like updating default user roles.
Mandates timely flaw remediation through patching the vulnerable plugin function to include missing capability checks.
NVD Description
The MWB HubSpot for WooCommerce – CRM, Abandoned Cart, Email Marketing, Marketing Automation & Analytics plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hubwoo_save_updates()…
more
function in all versions up to, and including, 1.5.9. This makes it possible for authenticated attackers, with Contributor-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Deeper analysisAI
CVE-2024-10591 affects the MWB HubSpot for WooCommerce – CRM, Abandoned Cart, Email Marketing, Marketing Automation & Analytics plugin for WordPress in all versions up to and including 1.5.9. The vulnerability stems from a missing capability check on the hubwoo_save_updates() function, enabling unauthorized modification of data that can lead to privilege escalation, as classified under CWE-862. It has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-01-30.
Authenticated attackers with Contributor-level access or higher can exploit this issue remotely without user interaction. By calling the vulnerable function, they can update arbitrary WordPress options, such as changing the default role for new user registrations to administrator and enabling user registration. This allows attackers to create administrative accounts and gain full control over the site.
Advisories reference the vulnerable code in class-hubwoo-ajax-handler.php at line 845, a patch in changeset 3231984, and Wordfence threat intelligence detailing the issue. Security practitioners should update to a patched version beyond 1.5.9 to mitigate the risk.
Details
- CWE(s)