CVE-2024-13316: CWE-862 Missing Authorization in akashmalik Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more
CVE-2024-13316 is a medium severity vulnerability in the WordPress plugin 'Scratch & Win – Giveaways and Contests' by akashmalik, affecting all versions up to 2. 8. 0. The flaw is due to a missing authorization check in the apmswn_create_discount() function, allowing unauthenticated attackers to create discount coupons. This vulnerability does not impact confidentiality or availability but can undermine the integrity of promotional campaigns by enabling unauthorized coupon creation. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to e-commerce and marketing sites using this plugin. Mitigation involves updating the plugin once a patch is released or applying custom authorization checks to restrict coupon creation. Countries with significant WordPress usage and e-commerce activity, such as the United States, United Kingdom, Germany, Australia, Canada, and India, are most likely to be affected. Organizations should prioritize monitoring and restricting access to coupon creation endpoints and validate plugin updates promptly.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-13316 affects the WordPress plugin 'Scratch & Win – Giveaways and Contests' by akashmalik, which is designed to boost subscribers, traffic, repeat visits, referrals, and sales through promotional giveaways and contests. The issue arises from a missing authorization check (CWE-862) in the apmswn_create_discount() function, which is responsible for creating discount coupons. This flaw allows unauthenticated attackers to invoke this function remotely without any capability verification, enabling them to generate arbitrary coupons. The vulnerability impacts all plugin versions up to and including 2.8.0. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based with low attack complexity, no privileges required, and no user interaction needed. The impact is limited to integrity, as unauthorized coupon creation can disrupt marketing campaigns, cause financial losses, and damage brand reputation. There is no direct impact on confidentiality or availability. No known exploits have been reported in the wild to date. The vulnerability was publicly disclosed in February 2025, with no official patch links available at the time, indicating that users must implement interim mitigations. The flaw is particularly relevant for e-commerce and marketing websites relying on this plugin for promotional activities, as unauthorized coupons can lead to revenue loss and skewed analytics. The vulnerability highlights the importance of proper authorization checks in WordPress plugin development, especially for functions that affect business logic and financial incentives.
Potential Impact
The primary impact of CVE-2024-13316 is on the integrity of promotional campaigns managed through the affected WordPress plugin. Unauthorized creation of discount coupons can lead to financial losses due to unintended discounts being applied, potentially eroding profit margins. It can also distort marketing metrics, making it difficult for organizations to assess the effectiveness of their campaigns accurately. Additionally, widespread abuse could damage the brand's reputation if customers exploit unauthorized coupons or if the business is perceived as having weak security controls. While confidentiality and availability are not directly impacted, the financial and reputational consequences can be significant for businesses relying on this plugin. The ease of exploitation without authentication and user interaction increases the risk of automated attacks targeting vulnerable sites. Organizations with high traffic e-commerce platforms or those heavily dependent on promotional giveaways are at greater risk of operational disruption and revenue impact.
Mitigation Recommendations
1. Monitor official plugin channels for updates and apply patches promptly once available to ensure the authorization check is implemented. 2. Until an official patch is released, implement custom code to enforce capability checks on the apmswn_create_discount() function, restricting coupon creation to authenticated users with appropriate privileges. 3. Use Web Application Firewalls (WAFs) to detect and block suspicious requests targeting coupon creation endpoints, especially those originating from unauthenticated sources. 4. Audit existing coupons for unauthorized entries and revoke any suspicious or fraudulent coupons to mitigate ongoing abuse. 5. Limit the exposure of the plugin’s administrative or API endpoints by restricting access via IP whitelisting or VPNs where feasible. 6. Educate site administrators on the risks of using outdated plugins and encourage regular security reviews of third-party components. 7. Implement logging and alerting on coupon creation activities to detect anomalous patterns indicative of exploitation attempts. 8. Consider alternative plugins with robust security practices if timely patching is not possible.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Brazil, Netherlands, Japan
CVE-2024-13316: CWE-862 Missing Authorization in akashmalik Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more
Description
CVE-2024-13316 is a medium severity vulnerability in the WordPress plugin 'Scratch & Win – Giveaways and Contests' by akashmalik, affecting all versions up to 2. 8. 0. The flaw is due to a missing authorization check in the apmswn_create_discount() function, allowing unauthenticated attackers to create discount coupons. This vulnerability does not impact confidentiality or availability but can undermine the integrity of promotional campaigns by enabling unauthorized coupon creation. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to e-commerce and marketing sites using this plugin. Mitigation involves updating the plugin once a patch is released or applying custom authorization checks to restrict coupon creation. Countries with significant WordPress usage and e-commerce activity, such as the United States, United Kingdom, Germany, Australia, Canada, and India, are most likely to be affected. Organizations should prioritize monitoring and restricting access to coupon creation endpoints and validate plugin updates promptly.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2024-13316 affects the WordPress plugin 'Scratch & Win – Giveaways and Contests' by akashmalik, which is designed to boost subscribers, traffic, repeat visits, referrals, and sales through promotional giveaways and contests. The issue arises from a missing authorization check (CWE-862) in the apmswn_create_discount() function, which is responsible for creating discount coupons. This flaw allows unauthenticated attackers to invoke this function remotely without any capability verification, enabling them to generate arbitrary coupons. The vulnerability impacts all plugin versions up to and including 2.8.0. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based with low attack complexity, no privileges required, and no user interaction needed. The impact is limited to integrity, as unauthorized coupon creation can disrupt marketing campaigns, cause financial losses, and damage brand reputation. There is no direct impact on confidentiality or availability. No known exploits have been reported in the wild to date. The vulnerability was publicly disclosed in February 2025, with no official patch links available at the time, indicating that users must implement interim mitigations. The flaw is particularly relevant for e-commerce and marketing websites relying on this plugin for promotional activities, as unauthorized coupons can lead to revenue loss and skewed analytics. The vulnerability highlights the importance of proper authorization checks in WordPress plugin development, especially for functions that affect business logic and financial incentives.
Potential Impact
The primary impact of CVE-2024-13316 is on the integrity of promotional campaigns managed through the affected WordPress plugin. Unauthorized creation of discount coupons can lead to financial losses due to unintended discounts being applied, potentially eroding profit margins. It can also distort marketing metrics, making it difficult for organizations to assess the effectiveness of their campaigns accurately. Additionally, widespread abuse could damage the brand's reputation if customers exploit unauthorized coupons or if the business is perceived as having weak security controls. While confidentiality and availability are not directly impacted, the financial and reputational consequences can be significant for businesses relying on this plugin. The ease of exploitation without authentication and user interaction increases the risk of automated attacks targeting vulnerable sites. Organizations with high traffic e-commerce platforms or those heavily dependent on promotional giveaways are at greater risk of operational disruption and revenue impact.
Mitigation Recommendations
1. Monitor official plugin channels for updates and apply patches promptly once available to ensure the authorization check is implemented. 2. Until an official patch is released, implement custom code to enforce capability checks on the apmswn_create_discount() function, restricting coupon creation to authenticated users with appropriate privileges. 3. Use Web Application Firewalls (WAFs) to detect and block suspicious requests targeting coupon creation endpoints, especially those originating from unauthenticated sources. 4. Audit existing coupons for unauthorized entries and revoke any suspicious or fraudulent coupons to mitigate ongoing abuse. 5. Limit the exposure of the plugin’s administrative or API endpoints by restricting access via IP whitelisting or VPNs where feasible. 6. Educate site administrators on the risks of using outdated plugins and encourage regular security reviews of third-party components. 7. Implement logging and alerting on coupon creation activities to detect anomalous patterns indicative of exploitation attempts. 8. Consider alternative plugins with robust security practices if timely patching is not possible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-09T22:05:47.683Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e4eb7ef31ef0b59ca84
Added to database: 2/25/2026, 9:49:02 PM
Last enriched: 2/26/2026, 2:13:53 AM
Last updated: 2/26/2026, 4:38:45 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Finding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumCVE-2026-2498: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bulktheme WP Social Meta
MediumCVE-2026-2489: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in readymadeweb TP2WP Importer
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.