CVE-2025-11771: CWE-306 Missing Authentication for Critical Function in beycanpress Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO
The Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO plugin for WordPress is vulnerable to unauthenticated and unauthorized modification of data due to missing authentication and capability checks on the 'createSaleRecord' function in all versions up to, and including, 2.4.6. This makes it possible for unauthenticated attackers to manipulate presales counters.
AI Analysis
Technical Summary
CVE-2025-11771 identifies a missing authentication vulnerability (CWE-306) in the beycanpress WordPress plugin 'Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO' affecting all versions up to 2.4.6. The vulnerability resides in the 'createSaleRecord' function, which lacks proper authentication and capability checks, allowing unauthenticated attackers to invoke this function and manipulate presale counters. This manipulation can alter the number of tokens sold or available during presale phases, potentially misleading stakeholders or disrupting the token sale process. The vulnerability is remotely exploitable over the network without any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS score of 5.3 reflects a medium severity, primarily due to the impact on data integrity without affecting confidentiality or availability. No patches or official fixes are currently published, and no known exploits have been reported in the wild. The plugin is commonly used in WordPress environments for managing cryptocurrency launches, ICOs, and airdrops, making it a critical component in the blockchain and crypto ecosystem. Attackers exploiting this vulnerability could disrupt token sale metrics, potentially causing financial and reputational damage to organizations relying on accurate presale data. Since the vulnerability allows unauthenticated access, it poses a significant risk to any exposed WordPress installations using this plugin. The lack of authentication checks violates secure coding best practices and highlights the need for strict access control on critical functions within plugins handling financial transactions or token sales.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized manipulation of token presale data, undermining the integrity of cryptocurrency launches and ICOs. Financially, this may result in inaccurate token distribution records, investor mistrust, and potential regulatory scrutiny, especially in jurisdictions with strict financial compliance requirements such as Germany and France. The disruption of presale counters could also facilitate fraudulent activities or market manipulation, impacting the broader crypto ecosystem's stability. Organizations relying on this plugin for managing token sales may face reputational damage if attackers exploit this flaw to distort sale metrics. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact on critical financial data is significant. European crypto startups, exchanges, and financial institutions integrating WordPress-based ICO management tools are particularly at risk. Additionally, regulatory bodies in the EU emphasizing transparency and data integrity in financial operations may increase oversight on affected entities. The medium severity rating suggests that while the threat is not immediately catastrophic, it requires timely remediation to prevent exploitation and maintain trust in token sale processes.
Mitigation Recommendations
1. Immediately restrict access to the 'createSaleRecord' function by implementing manual authentication and capability checks at the web server or application firewall level until an official patch is released. 2. Monitor presale counters and related token sale data for unusual or unauthorized changes, employing logging and alerting mechanisms to detect anomalies. 3. Disable or remove the beycanpress plugin if it is not essential to operations, or replace it with a more secure alternative that enforces proper authentication. 4. Regularly audit WordPress installations for outdated plugins and apply updates promptly once the vendor releases a fix for this vulnerability. 5. Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized requests targeting the vulnerable function. 6. Educate development and security teams on secure plugin development practices, emphasizing the importance of authentication on critical functions. 7. For organizations conducting ICOs, implement additional off-platform verification mechanisms to cross-check presale data integrity. 8. Engage with the plugin vendor or community to track patch availability and coordinate timely deployment. 9. Conduct penetration testing focused on plugin functionalities to identify similar authentication weaknesses proactively.
Affected Countries
Germany, United Kingdom, Netherlands, France, Switzerland, Estonia
CVE-2025-11771: CWE-306 Missing Authentication for Critical Function in beycanpress Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO
Description
The Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO plugin for WordPress is vulnerable to unauthenticated and unauthorized modification of data due to missing authentication and capability checks on the 'createSaleRecord' function in all versions up to, and including, 2.4.6. This makes it possible for unauthenticated attackers to manipulate presales counters.
AI-Powered Analysis
Technical Analysis
CVE-2025-11771 identifies a missing authentication vulnerability (CWE-306) in the beycanpress WordPress plugin 'Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO' affecting all versions up to 2.4.6. The vulnerability resides in the 'createSaleRecord' function, which lacks proper authentication and capability checks, allowing unauthenticated attackers to invoke this function and manipulate presale counters. This manipulation can alter the number of tokens sold or available during presale phases, potentially misleading stakeholders or disrupting the token sale process. The vulnerability is remotely exploitable over the network without any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS score of 5.3 reflects a medium severity, primarily due to the impact on data integrity without affecting confidentiality or availability. No patches or official fixes are currently published, and no known exploits have been reported in the wild. The plugin is commonly used in WordPress environments for managing cryptocurrency launches, ICOs, and airdrops, making it a critical component in the blockchain and crypto ecosystem. Attackers exploiting this vulnerability could disrupt token sale metrics, potentially causing financial and reputational damage to organizations relying on accurate presale data. Since the vulnerability allows unauthenticated access, it poses a significant risk to any exposed WordPress installations using this plugin. The lack of authentication checks violates secure coding best practices and highlights the need for strict access control on critical functions within plugins handling financial transactions or token sales.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized manipulation of token presale data, undermining the integrity of cryptocurrency launches and ICOs. Financially, this may result in inaccurate token distribution records, investor mistrust, and potential regulatory scrutiny, especially in jurisdictions with strict financial compliance requirements such as Germany and France. The disruption of presale counters could also facilitate fraudulent activities or market manipulation, impacting the broader crypto ecosystem's stability. Organizations relying on this plugin for managing token sales may face reputational damage if attackers exploit this flaw to distort sale metrics. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact on critical financial data is significant. European crypto startups, exchanges, and financial institutions integrating WordPress-based ICO management tools are particularly at risk. Additionally, regulatory bodies in the EU emphasizing transparency and data integrity in financial operations may increase oversight on affected entities. The medium severity rating suggests that while the threat is not immediately catastrophic, it requires timely remediation to prevent exploitation and maintain trust in token sale processes.
Mitigation Recommendations
1. Immediately restrict access to the 'createSaleRecord' function by implementing manual authentication and capability checks at the web server or application firewall level until an official patch is released. 2. Monitor presale counters and related token sale data for unusual or unauthorized changes, employing logging and alerting mechanisms to detect anomalies. 3. Disable or remove the beycanpress plugin if it is not essential to operations, or replace it with a more secure alternative that enforces proper authentication. 4. Regularly audit WordPress installations for outdated plugins and apply updates promptly once the vendor releases a fix for this vulnerability. 5. Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized requests targeting the vulnerable function. 6. Educate development and security teams on secure plugin development practices, emphasizing the importance of authentication on critical functions. 7. For organizations conducting ICOs, implement additional off-platform verification mechanisms to cross-check presale data integrity. 8. Engage with the plugin vendor or community to track patch availability and coordinate timely deployment. 9. Conduct penetration testing focused on plugin functionalities to identify similar authentication weaknesses proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-14T23:33:33.261Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69202359cf2d47c38997b415
Added to database: 11/21/2025, 8:31:21 AM
Last enriched: 11/28/2025, 8:44:59 AM
Last updated: 1/7/2026, 4:17:41 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.