Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8658: CWE-862 Missing Authorization in wpexpertsio myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce – Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification

0
Medium
VulnerabilityCVE-2024-8658cvecve-2024-8658cwe-862
Published: Wed Sep 25 2024 (09/25/2024, 05:32:09 UTC)
Source: CVE Database V5
Vendor/Project: wpexpertsio
Product: myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce – Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification

Description

CVE-2024-8658 is a medium-severity vulnerability in the myCred Loyalty Points and Rewards plugin for WordPress and WooCommerce. The flaw arises from a missing authorization check in the mycred_update_database() function, allowing unauthenticated attackers to trigger database upgrades. This unauthorized modification can lead to integrity issues in loyalty points, ranks, badges, cashback, and other gamification-related data. The vulnerability affects all versions up to and including 2. 7. 3. Exploitation requires no authentication or user interaction and can be performed remotely over the network. While no known exploits are currently reported in the wild, the vulnerability poses a risk to websites using this popular plugin for customer engagement and rewards. Organizations relying on this plugin should prioritize patching or mitigating this issue to prevent potential data manipulation. The CVSS score is 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:07:59 UTC

Technical Analysis

The vulnerability identified as CVE-2024-8658 affects the myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce, which is widely used to implement gamification features such as points, ranks, badges, cashback, and WooCommerce credits. The root cause is a missing authorization (capability) check in the mycred_update_database() function. This function is responsible for upgrading the plugin's database schema or data structures. Because the function lacks proper access control, unauthenticated attackers can invoke it remotely, forcing an upgrade of an out-of-date database. This unauthorized action can lead to unintended modifications of loyalty program data, potentially corrupting or manipulating user rewards and ranks. The vulnerability affects all versions up to and including 2.7.3. The CVSS 3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N, indicating that the attack can be performed remotely without authentication or user interaction, impacts integrity but not confidentiality or availability, and has unchanged scope. No patches or exploit code are currently publicly available, and no active exploitation has been reported. However, the plugin's popularity and the ease of exploitation make this a significant concern for affected sites.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification of loyalty program data, which can undermine the integrity of reward points, ranks, badges, cashback, and other gamification elements managed by the myCred plugin. For organizations, this can result in financial losses due to fraudulent reward redemptions or manipulation of customer loyalty data. It can also damage customer trust and brand reputation if users perceive the loyalty system as unreliable or compromised. Although the vulnerability does not directly affect confidentiality or availability, the integrity compromise can lead to downstream effects such as incorrect accounting, disputes, or exploitation of reward mechanisms. E-commerce sites and businesses relying heavily on gamification for customer engagement are particularly at risk. The ease of exploitation without authentication increases the likelihood of automated attacks or mass exploitation attempts, especially on sites that have not updated the plugin. The absence of known exploits in the wild currently limits immediate risk but does not preclude future attacks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the myCred plugin to a version that includes the proper authorization checks once it is released by the vendor. Until an official patch is available, administrators can implement the following specific measures: 1) Restrict access to the plugin's update functions by applying web application firewall (WAF) rules that block unauthorized requests targeting the mycred_update_database() endpoint or related AJAX actions. 2) Limit access to the WordPress admin-ajax.php endpoint from untrusted IP addresses or require authentication for AJAX calls where feasible. 3) Monitor logs for unusual or repeated calls to the update function indicative of exploitation attempts. 4) Regularly back up the WordPress database and plugin data to enable recovery in case of data corruption. 5) Review and harden WordPress user roles and capabilities to minimize exposure. 6) Consider temporarily disabling the plugin if the risk outweighs the business need until a patch is available. These targeted mitigations go beyond generic advice by focusing on access control and monitoring specific to the vulnerable function.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-09-10T14:27:42.568Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c2eb7ef31ef0b560d9f

Added to database: 2/25/2026, 9:39:58 PM

Last enriched: 2/26/2026, 4:07:59 AM

Last updated: 2/26/2026, 6:53:42 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats