CVE-2024-11423
Published: 08 January 2025
Summary
CVE-2024-11423 is a high-severity Missing Authorization (CWE-862) vulnerability in Wordpress (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, ranked in the top 4.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for logical access to API endpoints, directly preventing unauthorized modifications to gift card balances due to missing capability checks.
Implements least privilege to restrict API endpoints to only authorized users or roles necessary for gift card recharge and balance reduction functions.
Limits permitted actions without identification or authentication on sensitive REST API endpoints like /wp-json/gifting/recharge-giftcard to prevent unauthenticated data modifications.
NVD Description
The Ultimate Gift Cards for WooCommerce – Create WooCommerce Gift Cards, Gift Vouchers, Redeem & Manage Digital Gift Coupons. Offer Gift Certificates, Schedule Gift Cards, and Use Advance Coupons With Personalized Templates plugin for WordPress is vulnerable to unauthorized modification…
more
of data due to a missing capability check on several REST API endpoints such as /wp-json/gifting/recharge-giftcard in all versions up to, and including, 3.0.6. This makes it possible for unauthenticated attackers to recharge a gift card balance, without making a payment along with reducing gift card balances without purchasing anything.
Deeper analysisAI
CVE-2024-11423 is an unauthorized modification of data vulnerability (CWE-862) in the Ultimate Gift Cards for WooCommerce plugin for WordPress, which enables creation and management of gift cards, vouchers, and digital coupons. The issue stems from missing capability checks on several REST API endpoints, such as /wp-json/gifting/recharge-giftcard, affecting all versions up to and including 3.0.6. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), highlighting high integrity impact with no confidentiality or availability effects.
Unauthenticated attackers can exploit this vulnerability remotely with low attack complexity and no user interaction required. By sending crafted requests to the affected endpoints, they can recharge gift card balances without payments or reduce balances without purchases, potentially enabling fraudulent manipulation of store credits and financial losses for site owners.
Advisories reference patches in WordPress plugin trac changesets, including 3212554/woo-gift-cards-lite/trunk/includes/giftcard-redeem-api-addon.php and changeset 3208474 for woo-gift-cards-lite. The Wordfence threat intelligence page provides further details on the vulnerability, recommending updates to address the missing capability checks.
Details
- CWE(s)