Cyber Posture

CVE-2024-12920

High

Published: 19 March 2025

Published
19 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 36.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-12920 is a high-severity Missing Authorization (CWE-862) vulnerability in Themeforest (inferred from references). Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses missing capability checks by enforcing approved authorizations for logical access to functions enabling unauthorized file deletion, option modifications, and backup operations.

prevent

Mandates identification, reporting, and correction of flaws like the missing authorization checks in the FoodBakery theme, preventing exploitation across affected versions.

prevent

Employs least privilege to restrict Subscriber-level users from possessing capabilities for sensitive actions, limiting potential unauthorized access despite missing checks.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

The vulnerability in a public-facing WordPress theme directly enables exploitation via T1190; allows arbitrary file deletion via T1070.004; and facilitates stored data manipulation including theme options, backups, and widget data via T1565.001.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The FoodBakery | Delivery Restaurant Directory WordPress Theme theme for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all functions…

more

in all versions up to, and including, 4.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files, update theme options, export widget options, import widget options, generate backups, restore backups, and reset theme options.

Deeper analysisAI

CVE-2024-12920 is a high-severity vulnerability (CVSS 8.8) in the FoodBakery | Delivery Restaurant Directory WordPress Theme for WordPress, affecting all versions up to and including 4.7. It arises from missing capability checks on functions including foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all, enabling unauthorized data access and modification (CWE-862).

Authenticated attackers with Subscriber-level access or higher can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Exploitation allows attackers to delete arbitrary files, update or reset theme options, export widget settings, import widget data, generate backups, and restore backups, potentially leading to high confidentiality, integrity, and availability impacts.

Advisories from Wordfence and the theme's ThemeForest page provide additional details on the issue, though no specific patched version is detailed in available information. Security practitioners should review these sources for mitigation guidance and monitor for theme updates.

Details

CWE(s)

Affected Products

Themeforest
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-4277Shared CWE-862
CVE-2025-14457Shared CWE-862
CVE-2026-3360Shared CWE-862
CVE-2026-34053Shared CWE-862
CVE-2025-1657Shared CWE-862
CVE-2026-27386Shared CWE-862
CVE-2025-26733Shared CWE-862
CVE-2026-27071Shared CWE-862
CVE-2025-0952Shared CWE-862
CVE-2025-24591Shared CWE-862

References