CVE-2024-8658: CWE-862 Missing Authorization in wpexpertsio myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce – Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification
CVE-2024-8658 is a medium-severity vulnerability in the myCred Loyalty Points and Rewards plugin for WordPress and WooCommerce. The flaw arises from a missing authorization check in the mycred_update_database() function, allowing unauthenticated attackers to trigger database upgrades. This unauthorized modification can lead to integrity issues in loyalty points, ranks, badges, cashback, and other gamification-related data. The vulnerability affects all versions up to and including 2. 7. 3. Exploitation requires no authentication or user interaction and can be performed remotely over the network. While no known exploits are currently reported in the wild, the vulnerability poses a risk to websites using this popular plugin for customer engagement and rewards. Organizations relying on this plugin should prioritize patching or mitigating this issue to prevent potential data manipulation. The CVSS score is 5.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-8658 affects the myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce, which is widely used to implement gamification features such as points, ranks, badges, cashback, and WooCommerce credits. The root cause is a missing authorization (capability) check in the mycred_update_database() function. This function is responsible for upgrading the plugin's database schema or data structures. Because the function lacks proper access control, unauthenticated attackers can invoke it remotely, forcing an upgrade of an out-of-date database. This unauthorized action can lead to unintended modifications of loyalty program data, potentially corrupting or manipulating user rewards and ranks. The vulnerability affects all versions up to and including 2.7.3. The CVSS 3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N, indicating that the attack can be performed remotely without authentication or user interaction, impacts integrity but not confidentiality or availability, and has unchanged scope. No patches or exploit code are currently publicly available, and no active exploitation has been reported. However, the plugin's popularity and the ease of exploitation make this a significant concern for affected sites.
Potential Impact
The primary impact of this vulnerability is the unauthorized modification of loyalty program data, which can undermine the integrity of reward points, ranks, badges, cashback, and other gamification elements managed by the myCred plugin. For organizations, this can result in financial losses due to fraudulent reward redemptions or manipulation of customer loyalty data. It can also damage customer trust and brand reputation if users perceive the loyalty system as unreliable or compromised. Although the vulnerability does not directly affect confidentiality or availability, the integrity compromise can lead to downstream effects such as incorrect accounting, disputes, or exploitation of reward mechanisms. E-commerce sites and businesses relying heavily on gamification for customer engagement are particularly at risk. The ease of exploitation without authentication increases the likelihood of automated attacks or mass exploitation attempts, especially on sites that have not updated the plugin. The absence of known exploits in the wild currently limits immediate risk but does not preclude future attacks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the myCred plugin to a version that includes the proper authorization checks once it is released by the vendor. Until an official patch is available, administrators can implement the following specific measures: 1) Restrict access to the plugin's update functions by applying web application firewall (WAF) rules that block unauthorized requests targeting the mycred_update_database() endpoint or related AJAX actions. 2) Limit access to the WordPress admin-ajax.php endpoint from untrusted IP addresses or require authentication for AJAX calls where feasible. 3) Monitor logs for unusual or repeated calls to the update function indicative of exploitation attempts. 4) Regularly back up the WordPress database and plugin data to enable recovery in case of data corruption. 5) Review and harden WordPress user roles and capabilities to minimize exposure. 6) Consider temporarily disabling the plugin if the risk outweighs the business need until a patch is available. These targeted mitigations go beyond generic advice by focusing on access control and monitoring specific to the vulnerable function.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Brazil, Netherlands, Japan, Italy, Spain
CVE-2024-8658: CWE-862 Missing Authorization in wpexpertsio myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce – Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification
Description
CVE-2024-8658 is a medium-severity vulnerability in the myCred Loyalty Points and Rewards plugin for WordPress and WooCommerce. The flaw arises from a missing authorization check in the mycred_update_database() function, allowing unauthenticated attackers to trigger database upgrades. This unauthorized modification can lead to integrity issues in loyalty points, ranks, badges, cashback, and other gamification-related data. The vulnerability affects all versions up to and including 2. 7. 3. Exploitation requires no authentication or user interaction and can be performed remotely over the network. While no known exploits are currently reported in the wild, the vulnerability poses a risk to websites using this popular plugin for customer engagement and rewards. Organizations relying on this plugin should prioritize patching or mitigating this issue to prevent potential data manipulation. The CVSS score is 5.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2024-8658 affects the myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce, which is widely used to implement gamification features such as points, ranks, badges, cashback, and WooCommerce credits. The root cause is a missing authorization (capability) check in the mycred_update_database() function. This function is responsible for upgrading the plugin's database schema or data structures. Because the function lacks proper access control, unauthenticated attackers can invoke it remotely, forcing an upgrade of an out-of-date database. This unauthorized action can lead to unintended modifications of loyalty program data, potentially corrupting or manipulating user rewards and ranks. The vulnerability affects all versions up to and including 2.7.3. The CVSS 3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N, indicating that the attack can be performed remotely without authentication or user interaction, impacts integrity but not confidentiality or availability, and has unchanged scope. No patches or exploit code are currently publicly available, and no active exploitation has been reported. However, the plugin's popularity and the ease of exploitation make this a significant concern for affected sites.
Potential Impact
The primary impact of this vulnerability is the unauthorized modification of loyalty program data, which can undermine the integrity of reward points, ranks, badges, cashback, and other gamification elements managed by the myCred plugin. For organizations, this can result in financial losses due to fraudulent reward redemptions or manipulation of customer loyalty data. It can also damage customer trust and brand reputation if users perceive the loyalty system as unreliable or compromised. Although the vulnerability does not directly affect confidentiality or availability, the integrity compromise can lead to downstream effects such as incorrect accounting, disputes, or exploitation of reward mechanisms. E-commerce sites and businesses relying heavily on gamification for customer engagement are particularly at risk. The ease of exploitation without authentication increases the likelihood of automated attacks or mass exploitation attempts, especially on sites that have not updated the plugin. The absence of known exploits in the wild currently limits immediate risk but does not preclude future attacks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the myCred plugin to a version that includes the proper authorization checks once it is released by the vendor. Until an official patch is available, administrators can implement the following specific measures: 1) Restrict access to the plugin's update functions by applying web application firewall (WAF) rules that block unauthorized requests targeting the mycred_update_database() endpoint or related AJAX actions. 2) Limit access to the WordPress admin-ajax.php endpoint from untrusted IP addresses or require authentication for AJAX calls where feasible. 3) Monitor logs for unusual or repeated calls to the update function indicative of exploitation attempts. 4) Regularly back up the WordPress database and plugin data to enable recovery in case of data corruption. 5) Review and harden WordPress user roles and capabilities to minimize exposure. 6) Consider temporarily disabling the plugin if the risk outweighs the business need until a patch is available. These targeted mitigations go beyond generic advice by focusing on access control and monitoring specific to the vulnerable function.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-09-10T14:27:42.568Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c2eb7ef31ef0b560d9f
Added to database: 2/25/2026, 9:39:58 PM
Last enriched: 2/26/2026, 4:07:59 AM
Last updated: 2/26/2026, 6:53:42 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.