VYPR
Medium severity5.4NVD Advisory· Published Jun 11, 2024· Updated Apr 15, 2026

CVE-2024-34804

CVE-2024-34804

Description

Missing Authorization vulnerability in Tagembed.This issue affects Tagembed: from n/a through 5.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Tagembed WordPress plugin versions up to 5.8 have a missing authorization vulnerability allowing unauthenticated attackers to perform privileged actions.

Vulnerability

Overview The Tagembed WordPress plugin contains a missing authorization vulnerability affecting versions from n/a through 5.8 [1]. This flaw is classified as a broken access control issue, where the plugin fails to properly verify user permissions or nonce tokens in certain functions, allowing unauthenticated users to execute actions normally reserved for higher-privileged roles [1].

Exploitation

Scenario An attacker can exploit this vulnerability remotely without requiring any authentication or prior access, as the missing authorization check exists in publicly accessible functions [1]. This type of flaw is frequently targeted in mass-exploit campaigns that scan for vulnerable plugins across thousands of websites regardless of their popularity or traffic levels [1]. The low complexity and network-based attack vector increase the risk of widespread exploitation.

Impact

Successful exploitation allows an unprivileged or completely unauthenticated attacker to perform higher-privileged actions within the plugin, potentially including unauthorized configuration changes or access to sensitive data [1]. The CVSS v3 base score of 5.4 (Medium) reflects the limited but significant impact on confidentiality and integrity, though no impact on availability is noted [1].

Mitigation

The vulnerability has been patched in version 5.9 of the Tagembed plugin [1]. Users are strongly advised to update immediately; Patchstack users can enable auto-updates for vulnerable plugins. For those unable to update, contacting a hosting provider or web developer for assistance is recommended [1]. This issue is not listed on CISA's Known Exploited Vulnerabilities catalog as of the publication date.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.