Unauthorized Data Access in W3 Total Cache Plugin for WordPress
CVE-2024-12365

8.5HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
14 January 2025

Badges

📈 Score: 280👾 Exploit Exists📰 News Worthy

What is CVE-2024-12365?

CVE-2024-12365 is a vulnerability found in the W3 Total Cache plugin for WordPress, developed by Boldgrid. This plugin is designed to enhance the performance of WordPress sites through caching mechanisms that improve load times and overall efficiency. The identified vulnerability stems from a missing capability check in a specific function, allowing attackers with minimal access rights (Subscriber-level and above) to gain unauthorized access to sensitive data. Organizations utilizing this plugin may face severe consequences, including information leakage, unauthorized actions, and potential manipulation of service plans, which can ultimately undermine the security and reliability of their web applications.

Technical Details

The vulnerability is associated with the is_w3tc_admin_page function in the W3 Total Cache plugin, present in all versions up to and including 2.8.1. The lack of proper capability checks permits authenticated attackers to access a nonce value for the plugin, enabling them to execute actions that should otherwise be restricted. This oversight creates pathways for adversaries to perform unauthorized operations, leading to serious concerns regarding data integrity and application security.

Potential Impact of CVE-2024-12365

  1. Unauthorized Data Disclosure: Attackers can exploit this vulnerability to access sensitive information stored within the plugin, potentially exposing user data or other confidential information that could harm the organization.

  2. Service Abuse: By manipulating the plugin’s functionalities, attackers may consume service plan limits excessively, potentially resulting in degraded service for legitimate users and incurring additional costs to the affected organization.

  3. Information Leaks to External Entities: The vulnerability allows for unauthorized web requests to be made from the application to arbitrary locations, which could lead to unintended interactions with internal services and the exposure of critical instance metadata, compromising the entire cloud-based infrastructure.

Affected Version(s)

W3 Total Cache * <= 2.8.1

News Articles

product vulnerabilities / malware / ransomware

Our focus is on the home user, and how to secure your privacy and safety online.

W3 Total Cache plugin flaw exposes 1 million WordPress sites to attacks

A severe flaw in the W3 Total Cache plugin installed on more than one million WordPress sites could give attackers access to various information, including metadata on cloud-based apps.

W3 Total Cache Plugin Vulnerability Let Attackers Gain Unauthorized Access to Sensitive Data

A significant security vulnerability has been identified in the W3 Total Cache plugin for WordPress, affecting all versions up to and including 2.8.1.

References

CVSS V3.1

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by GBHackers News

  • Vulnerability published

  • Vulnerability Reserved

Credit

Villu Orav
.