Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13316: CWE-862 Missing Authorization in akashmalik Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more

0
Medium
VulnerabilityCVE-2024-13316cvecve-2024-13316cwe-862
Published: Tue Feb 18 2025 (02/18/2025, 08:21:43 UTC)
Source: CVE Database V5
Vendor/Project: akashmalik
Product: Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more

Description

CVE-2024-13316 is a medium severity vulnerability in the WordPress plugin 'Scratch & Win – Giveaways and Contests' by akashmalik, affecting all versions up to 2. 8. 0. The flaw is due to a missing authorization check in the apmswn_create_discount() function, allowing unauthenticated attackers to create discount coupons. This vulnerability does not impact confidentiality or availability but can undermine the integrity of promotional campaigns by enabling unauthorized coupon creation. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to e-commerce and marketing sites using this plugin. Mitigation involves updating the plugin once a patch is released or applying custom authorization checks to restrict coupon creation. Countries with significant WordPress usage and e-commerce activity, such as the United States, United Kingdom, Germany, Australia, Canada, and India, are most likely to be affected. Organizations should prioritize monitoring and restricting access to coupon creation endpoints and validate plugin updates promptly.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:13:53 UTC

Technical Analysis

The vulnerability identified as CVE-2024-13316 affects the WordPress plugin 'Scratch & Win – Giveaways and Contests' by akashmalik, which is designed to boost subscribers, traffic, repeat visits, referrals, and sales through promotional giveaways and contests. The issue arises from a missing authorization check (CWE-862) in the apmswn_create_discount() function, which is responsible for creating discount coupons. This flaw allows unauthenticated attackers to invoke this function remotely without any capability verification, enabling them to generate arbitrary coupons. The vulnerability impacts all plugin versions up to and including 2.8.0. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based with low attack complexity, no privileges required, and no user interaction needed. The impact is limited to integrity, as unauthorized coupon creation can disrupt marketing campaigns, cause financial losses, and damage brand reputation. There is no direct impact on confidentiality or availability. No known exploits have been reported in the wild to date. The vulnerability was publicly disclosed in February 2025, with no official patch links available at the time, indicating that users must implement interim mitigations. The flaw is particularly relevant for e-commerce and marketing websites relying on this plugin for promotional activities, as unauthorized coupons can lead to revenue loss and skewed analytics. The vulnerability highlights the importance of proper authorization checks in WordPress plugin development, especially for functions that affect business logic and financial incentives.

Potential Impact

The primary impact of CVE-2024-13316 is on the integrity of promotional campaigns managed through the affected WordPress plugin. Unauthorized creation of discount coupons can lead to financial losses due to unintended discounts being applied, potentially eroding profit margins. It can also distort marketing metrics, making it difficult for organizations to assess the effectiveness of their campaigns accurately. Additionally, widespread abuse could damage the brand's reputation if customers exploit unauthorized coupons or if the business is perceived as having weak security controls. While confidentiality and availability are not directly impacted, the financial and reputational consequences can be significant for businesses relying on this plugin. The ease of exploitation without authentication and user interaction increases the risk of automated attacks targeting vulnerable sites. Organizations with high traffic e-commerce platforms or those heavily dependent on promotional giveaways are at greater risk of operational disruption and revenue impact.

Mitigation Recommendations

1. Monitor official plugin channels for updates and apply patches promptly once available to ensure the authorization check is implemented. 2. Until an official patch is released, implement custom code to enforce capability checks on the apmswn_create_discount() function, restricting coupon creation to authenticated users with appropriate privileges. 3. Use Web Application Firewalls (WAFs) to detect and block suspicious requests targeting coupon creation endpoints, especially those originating from unauthenticated sources. 4. Audit existing coupons for unauthorized entries and revoke any suspicious or fraudulent coupons to mitigate ongoing abuse. 5. Limit the exposure of the plugin’s administrative or API endpoints by restricting access via IP whitelisting or VPNs where feasible. 6. Educate site administrators on the risks of using outdated plugins and encourage regular security reviews of third-party components. 7. Implement logging and alerting on coupon creation activities to detect anomalous patterns indicative of exploitation attempts. 8. Consider alternative plugins with robust security practices if timely patching is not possible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-09T22:05:47.683Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e4eb7ef31ef0b59ca84

Added to database: 2/25/2026, 9:49:02 PM

Last enriched: 2/26/2026, 2:13:53 AM

Last updated: 2/26/2026, 4:38:45 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats