CVE-2025-11773: CWE-862 Missing Authorization in beycanpress Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO
The Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'saveDeployedContract' function in all versions up to, and including, 2.4.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the WordPress option `tokenico_deployed_contracts`, poisoning the smart contract addresses displayed.
AI Analysis
Technical Summary
CVE-2025-11773 is a vulnerability classified under CWE-862 (Missing Authorization) found in the beycanpress WordPress plugin 'Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO'. The issue arises because the 'saveDeployedContract' function lacks proper capability checks, allowing any authenticated user with at least Subscriber-level privileges to invoke it and overwrite the WordPress option 'tokenico_deployed_contracts'. This option stores the addresses of deployed smart contracts that the plugin displays and uses for cryptocurrency-related operations such as ICOs, IDOs, and airdrops. By poisoning these addresses, an attacker can cause the plugin to display or interact with malicious or attacker-controlled smart contracts, potentially redirecting funds or misleading users. The vulnerability affects all versions up to 2.4.6 and does not require user interaction beyond authentication. The CVSS 3.1 base score is 4.3 (medium), reflecting the low complexity of exploitation (low attack complexity), network attack vector, and limited impact on integrity without affecting confidentiality or availability. No patches or public exploits are currently available, but the risk lies in unauthorized data modification that can undermine trust and financial transactions within the affected WordPress sites.
Potential Impact
For European organizations, especially those operating cryptocurrency platforms, ICO launchpads, or token airdrops using WordPress with this plugin, the vulnerability poses a risk of unauthorized manipulation of smart contract addresses. This can lead to redirection of funds to attacker-controlled contracts, resulting in financial losses and damage to reputation. Since the attack requires only Subscriber-level access, insider threats or compromised low-privilege accounts can exploit this flaw. The integrity of token sale processes and associated smart contract interactions can be compromised, undermining user trust and regulatory compliance. Additionally, misinformation about contract addresses can cause confusion and potential legal liabilities. The impact is particularly significant for organizations in countries with active crypto markets and stringent financial regulations, where trust and transparency are critical.
Mitigation Recommendations
1. Immediately restrict Subscriber and other low-privilege user roles from accessing or invoking functions related to contract deployment or modification within the plugin, possibly by using role management plugins or custom code hooks. 2. Monitor and audit changes to the 'tokenico_deployed_contracts' WordPress option using logging plugins or custom monitoring to detect unauthorized modifications promptly. 3. Implement multi-factor authentication (MFA) for all authenticated users to reduce the risk of account compromise. 4. Isolate or sandbox WordPress installations used for cryptocurrency operations to limit exposure. 5. Engage with the plugin vendor or community to obtain or request a security patch; apply updates as soon as they become available. 6. Consider temporarily disabling the plugin or its vulnerable features if patching is not immediately possible, especially during active ICO or token sale periods. 7. Educate users and administrators about the risk of low-privilege account compromise and enforce strict user access policies.
Affected Countries
Germany, United Kingdom, Netherlands, France, Switzerland, Sweden
CVE-2025-11773: CWE-862 Missing Authorization in beycanpress Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO
Description
The Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'saveDeployedContract' function in all versions up to, and including, 2.4.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the WordPress option `tokenico_deployed_contracts`, poisoning the smart contract addresses displayed.
AI-Powered Analysis
Technical Analysis
CVE-2025-11773 is a vulnerability classified under CWE-862 (Missing Authorization) found in the beycanpress WordPress plugin 'Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO'. The issue arises because the 'saveDeployedContract' function lacks proper capability checks, allowing any authenticated user with at least Subscriber-level privileges to invoke it and overwrite the WordPress option 'tokenico_deployed_contracts'. This option stores the addresses of deployed smart contracts that the plugin displays and uses for cryptocurrency-related operations such as ICOs, IDOs, and airdrops. By poisoning these addresses, an attacker can cause the plugin to display or interact with malicious or attacker-controlled smart contracts, potentially redirecting funds or misleading users. The vulnerability affects all versions up to 2.4.6 and does not require user interaction beyond authentication. The CVSS 3.1 base score is 4.3 (medium), reflecting the low complexity of exploitation (low attack complexity), network attack vector, and limited impact on integrity without affecting confidentiality or availability. No patches or public exploits are currently available, but the risk lies in unauthorized data modification that can undermine trust and financial transactions within the affected WordPress sites.
Potential Impact
For European organizations, especially those operating cryptocurrency platforms, ICO launchpads, or token airdrops using WordPress with this plugin, the vulnerability poses a risk of unauthorized manipulation of smart contract addresses. This can lead to redirection of funds to attacker-controlled contracts, resulting in financial losses and damage to reputation. Since the attack requires only Subscriber-level access, insider threats or compromised low-privilege accounts can exploit this flaw. The integrity of token sale processes and associated smart contract interactions can be compromised, undermining user trust and regulatory compliance. Additionally, misinformation about contract addresses can cause confusion and potential legal liabilities. The impact is particularly significant for organizations in countries with active crypto markets and stringent financial regulations, where trust and transparency are critical.
Mitigation Recommendations
1. Immediately restrict Subscriber and other low-privilege user roles from accessing or invoking functions related to contract deployment or modification within the plugin, possibly by using role management plugins or custom code hooks. 2. Monitor and audit changes to the 'tokenico_deployed_contracts' WordPress option using logging plugins or custom monitoring to detect unauthorized modifications promptly. 3. Implement multi-factor authentication (MFA) for all authenticated users to reduce the risk of account compromise. 4. Isolate or sandbox WordPress installations used for cryptocurrency operations to limit exposure. 5. Engage with the plugin vendor or community to obtain or request a security patch; apply updates as soon as they become available. 6. Consider temporarily disabling the plugin or its vulnerable features if patching is not immediately possible, especially during active ICO or token sale periods. 7. Educate users and administrators about the risk of low-privilege account compromise and enforce strict user access policies.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-14T23:38:10.444Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69202359cf2d47c38997b47e
Added to database: 11/21/2025, 8:31:21 AM
Last enriched: 11/28/2025, 8:45:12 AM
Last updated: 1/7/2026, 8:47:23 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.