CVE-2024-12263

4.3 MEDIUM

📋 TL;DR

The Child Theme Creator by Orbisius WordPress plugin's Cloud Library Addon has missing capability checks in cloud_delete() and cloud_update() functions, allowing authenticated attackers with Subscriber-level access or higher to modify or delete cloud snippets. This affects all plugin versions up to and including 1.5.5. The vulnerability was in the Cloud Library Addon, which has been removed entirely.

💻 Affected Systems

Products:
  • Child Theme Creator by Orbisius WordPress plugin
Versions: All versions up to and including 1.5.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability was in the Cloud Library Addon component, not the core plugin. The addon has been completely removed in the fix.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete or modify all cloud snippets, potentially disrupting website functionality or injecting malicious code if snippets are used in themes.

🟠

Likely Case

Unauthorized users modifying or deleting cloud snippets used for theme customization, causing website display issues.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to data integrity issues within the cloud snippet feature.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access with at least Subscriber privileges. Simple HTTP requests to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.5.5

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3205672%40orbisius-child-theme-creator&new=3205672%40orbisius-child-theme-creator&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Update Child Theme Creator by Orbisius plugin to latest version. 2. The Cloud Library Addon has been removed entirely in the fix. 3. No server restart required.

🔧 Temporary Workarounds

Disable Cloud Library Addon

all

Remove or disable the Cloud Library Addon component if still present

Navigate to WordPress plugins page and deactivate Cloud Library Addon if visible

Restrict User Roles

all

Limit Subscriber and other low-privilege user accounts

Review and remove unnecessary Subscriber accounts
Implement least privilege principle for all users

🧯 If You Can't Patch

  • Remove the Child Theme Creator plugin entirely if not essential
  • Implement web application firewall rules to block requests to cloud_delete and cloud_update endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for Child Theme Creator plugin version. If version is 1.5.5 or earlier, you are vulnerable.

Check Version:

Check WordPress admin dashboard > Plugins > Child Theme Creator by Orbisius version

Verify Fix Applied:

Update plugin to latest version and verify Cloud Library Addon is no longer present in plugins list.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action parameters containing 'cloud_delete' or 'cloud_update' from low-privilege users

Network Indicators:

  • Unusual API calls to cloud snippet management endpoints from non-admin users

SIEM Query:

source="wordpress_logs" AND (action="cloud_delete" OR action="cloud_update") AND user_role="subscriber"

🔗 References

📤 Share & Export