CVE-2024-11725
Published: 07 January 2025
Summary
CVE-2024-11725 is a high-severity Missing Authorization (CWE-862) vulnerability in Cozyvision Sms Alert Order Notifications. Its CVSS base score is 8.8 (High).
Operationally, ranked in the top 38.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations to directly address the missing capability check allowing unauthorized modification of WordPress options.
Remediates the specific flaw in the plugin by applying updates that implement the required capability checks.
Applies least privilege to restrict subscriber-level users from accessing sensitive functions like updating site options, limiting escalation potential.
NVD Description
The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the updateWcWarrantySettings() function in all versions up to, and including,…
more
3.7.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. Please note this requires the woocommerce-warranty plugin to be installed in order to be exploited.
Deeper analysisAI
CVE-2024-11725 is a vulnerability in the SMS Alert Order Notifications – WooCommerce plugin for WordPress, affecting all versions up to and including 3.7.6. It arises from a missing capability check on the updateWcWarrantySettings() function, enabling unauthorized modification of data that results in privilege escalation (CWE-862). Exploitation requires the woocommerce-warranty plugin to also be installed on the target site. The issue carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-01-07.
Authenticated attackers with subscriber-level access or higher can exploit this vulnerability remotely over the network with low complexity. By calling the vulnerable function, they can update arbitrary WordPress site options, such as modifying the default user role for registrations to administrator and enabling user registration. This allows attackers to create accounts with full administrative privileges, potentially leading to complete site compromise.
WordPress plugin trac references, including code at helper/return-warranty.php (line 74) and changesets such as 3198056, 3197777, 3199795, and 3207391, document the issue and associated fixes in the sms-alert plugin repository. Security practitioners should update to a version beyond 3.7.6 to apply the capability checks and mitigate the risk.
Details
- CWE(s)