CVE-2024-32444
BaseFortify
Publication date: 2025-09-03
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| inspirationthemes | realhomes | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2024-32444 is a high-severity privilege escalation vulnerability in the WordPress RealHomes theme (up to version 4.3.6). It allows an unauthenticated attacker with low privileges to escalate their access rights to higher privileges, potentially gaining full control over the affected website. This vulnerability is related to broken access control. [1]
How can this vulnerability impact me? :
This vulnerability can allow attackers to gain full control over your website without any prior authentication. This means they could manipulate, steal, or delete data, install malware, or disrupt your website's operations, leading to severe security and operational impacts. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The provided resources do not include specific commands or detailed methods to detect this vulnerability on your network or system. It is recommended to monitor for exploitation attempts and consider professional incident response or server-side malware scanning if compromise is suspected. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying the virtual patch (vPatch) provided by Patchstack to block exploitation attempts and updating the RealHomes theme to version 4.3.7 or later, which contains the official fix. Users should update promptly to eliminate the risk and consider professional incident response if compromise is suspected. [1]