Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11771: CWE-306 Missing Authentication for Critical Function in beycanpress Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO

0
Medium
VulnerabilityCVE-2025-11771cvecve-2025-11771cwe-306
Published: Fri Nov 21 2025 (11/21/2025, 07:31:55 UTC)
Source: CVE Database V5
Vendor/Project: beycanpress
Product: Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO

Description

The Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO plugin for WordPress is vulnerable to unauthenticated and unauthorized modification of data due to missing authentication and capability checks on the 'createSaleRecord' function in all versions up to, and including, 2.4.6. This makes it possible for unauthenticated attackers to manipulate presales counters.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 19:21:00 UTC

Technical Analysis

CVE-2025-11771 identifies a vulnerability in the beycanpress WordPress plugin designed for managing cryptocurrency tokens, launchpads, ICOs, IDOs, and airdrops. The issue stems from the 'createSaleRecord' function lacking proper authentication and capability checks, allowing unauthenticated and unauthorized users to invoke this function. This results in the ability to manipulate presale counters, which are critical for tracking token sale progress and investor commitments. The vulnerability affects all versions up to and including 2.4.6 of the plugin. The attack vector is network-based with no privileges or user interaction required, making exploitation straightforward for remote attackers. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function), indicating a failure to enforce access controls on sensitive operations. While the vulnerability does not expose confidential data or disrupt service availability, it undermines the integrity of presale data, potentially causing financial and reputational damage. No patches or mitigations have been officially released at the time of publication, and no exploits have been observed in the wild. The CVSS v3.1 base score is 5.3, reflecting medium severity due to the ease of exploitation balanced against limited impact on confidentiality and availability.

Potential Impact

The primary impact of CVE-2025-11771 is the unauthorized modification of presale counters within the affected WordPress plugin. This can lead to inaccurate representation of token sale progress, misleading investors, partners, and internal stakeholders. Financially, this could result in incorrect allocation of tokens, loss of investor trust, and potential legal or regulatory repercussions if presale data is manipulated maliciously. Organizations relying on this plugin for ICO, IDO, or airdrop management may face operational disruptions and reputational damage. Since the vulnerability does not affect confidentiality or availability, direct data breaches or service outages are unlikely. However, the integrity compromise can indirectly affect business decisions and market confidence. The ease of exploitation without authentication increases risk, especially for publicly accessible WordPress sites. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks, especially as awareness grows.

Mitigation Recommendations

To mitigate CVE-2025-11771, organizations should immediately restrict public access to the vulnerable 'createSaleRecord' function by implementing web application firewalls (WAF) rules that block unauthorized requests targeting this endpoint. Until an official patch is released, administrators can disable or remove the plugin if feasible or restrict plugin access to trusted IP addresses only. Monitoring and logging all requests to the plugin’s presale functions can help detect suspicious activity early. It is critical to apply principle of least privilege by ensuring only authenticated and authorized users can perform sale record modifications. Organizations should also maintain regular backups of presale data to enable recovery from unauthorized changes. Once the vendor releases a patch, prompt application of updates is essential. Additionally, conducting security audits on WordPress plugins before deployment can prevent similar issues. Educating development teams on secure coding practices, especially enforcing authentication on critical functions, will reduce future risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-14T23:33:33.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69202359cf2d47c38997b415

Added to database: 11/21/2025, 8:31:21 AM

Last enriched: 2/27/2026, 7:21:00 PM

Last updated: 3/26/2026, 4:35:22 AM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses