Crafthemes Demo Import Vulnerability (High) – CVE-2024-34800

Crafthemes Demo Import Vulnerability (High) – CVE-2024-34800

by | Apr 15, 2026 | Plugins

Attack Vectors

CVE-2024-34800 is a High severity issue (CVSS 8.8) affecting the Crafthemes Demo Import WordPress plugin (slug: crafthemes-demo-import) versions 3.3 and earlier. The vulnerability is caused by a missing authorization (capability) check in the ct_ctdi_install_plugin() function, which can allow authenticated users with subscriber-level access or higher to install arbitrary plugins.

From a business-risk perspective, this means an attacker doesn’t necessarily need full administrative access to start changing the site’s software inventory. Any path that results in an attacker obtaining a low-privilege WordPress login (credential reuse, phishing, a compromised user device, or weak passwords) can become a stepping stone to installing additional plugins.

Security Weakness

The core weakness is a missing capability check—the plugin function that installs other plugins does not adequately confirm that the logged-in user is authorized to perform that action. In WordPress environments, installing plugins should be restricted to trusted administrative roles because it directly changes the site’s code and behavior.

This type of issue is particularly risky in organizations where WordPress accounts are issued broadly (for example, to contractors, agencies, interns, or multiple marketing staff). Even though subscriber accounts are “low privilege,” the vulnerability can effectively turn that low privilege into a route for expanding control over the website’s functionality.

Remediation: Update Crafthemes Demo Import to version 4.0 or later (a patched version). Source: Wordfence vulnerability record.

Technical or Business Impacts

Because the vulnerability enables unauthorized plugin installation, the potential impacts go beyond a single plugin bug. Installing arbitrary plugins can introduce additional vulnerabilities and materially increase operational and compliance risk.

Business and operational impacts may include:

• Website takeover risk: Installing a malicious or vulnerable plugin can open a path to broader control of the WordPress environment, potentially escalating privileges and enabling persistent access.

• Data exposure and compliance risk: If a malicious plugin is installed, it may create opportunities to access or exfiltrate sensitive data handled by the site (depending on what the site stores/collects). This can trigger reporting obligations and compliance concerns.

• Brand and revenue impact: Website defacement, SEO spam injection, or redirect malware can damage brand trust, reduce conversion rates, and impact paid campaigns and organic search visibility.

• Incident response cost: Even if the issue is contained quickly, investigations, cleanup, restoring from backups, and validating site integrity can consume significant internal time and external agency spend.

Reference: CVE-2024-34800.

Similar Attacks

Authorization and access-control weaknesses—especially those involving actions that should be admin-only—are a common pattern in WordPress incidents. Recent real-world examples include:

CVE-2023-40000 – A WordPress plugin vulnerability involving missing authorization (illustrative of the same class of problem where non-admin users can trigger privileged actions).

CVE-2024-1071 – A widely reported WordPress plugin issue that highlights how plugin vulnerabilities can lead to high-impact outcomes for organizations running affected versions.

CVE-2024-34800 (this issue) – Demonstrates how “subscriber-level” access combined with missing authorization can become a serious business risk.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers