CVSS 3.1 Score 4.3 of 10 (medium)


Published Feb 5, 2024
Updated: Feb 13, 2024
CWE ID 862


CVE-2024-0791 is a vulnerability found in the WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress. This vulnerability affects all versions up to and including It allows authenticated attackers with subscriber access or higher to create, delete, or modify taxonomy terms without proper authorization checks on the wpbe_create_new_term, wpbe_update_tax_term, and wpbe_delete_tax_term functions. The potential danger of this vulnerability is unauthorized access, modification, or loss of data. The affected products include tHubPC, tHubPD, tHubPB, ubC5mT, ubC5mU, tHubPG, ugUufN, tHubPH, tHubPE, tHubPF, tHubPK, tHubPL, tHubPI, tHubPJ, tHubPM, and tHubPN. To remediate this issue, users should update their plugin to a version that includes the fix for this vulnerability.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.


Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-0791 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions