CVE-2025-11773: CWE-862 Missing Authorization in beycanpress Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO
The Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'saveDeployedContract' function in all versions up to, and including, 2.4.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the WordPress option `tokenico_deployed_contracts`, poisoning the smart contract addresses displayed.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-11773 affects the beycanpress WordPress plugin 'Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO' in all versions up to and including 2.4.6. The root cause is a missing authorization (capability) check in the 'saveDeployedContract' function, which is responsible for saving deployed smart contract addresses within the WordPress options database under the key 'tokenico_deployed_contracts'. Because of this missing check, any authenticated user with at least Subscriber-level privileges can invoke this function to overwrite the stored contract addresses. This unauthorized modification can lead to the display of malicious or incorrect smart contract addresses on the affected WordPress site. Attackers could exploit this to mislead investors or users interacting with the ICO or token launchpad, potentially redirecting funds or causing financial loss. The vulnerability does not require user interaction beyond authentication and has a CVSS 3.1 base score of 4.3, reflecting a medium severity primarily due to its limited impact on integrity and no impact on confidentiality or availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability falls under CWE-862 (Missing Authorization), emphasizing the importance of proper capability checks in WordPress plugin development.
Potential Impact
The primary impact of this vulnerability is on data integrity within affected WordPress sites using the beycanpress plugin. Unauthorized users with Subscriber-level access can alter smart contract addresses, potentially redirecting users to malicious contracts or invalid addresses. This can lead to financial losses for investors or users interacting with ICOs, presales, or token launches hosted on compromised sites. The trustworthiness and reputation of organizations running these platforms can be severely damaged. Although the vulnerability does not directly compromise confidentiality or availability, the manipulation of contract addresses can facilitate fraud, phishing, or theft of cryptocurrency assets. Organizations relying on this plugin for critical token sale infrastructure are at risk of targeted attacks, especially if they do not enforce strict user role management or monitor changes to contract data. The lack of known exploits suggests limited current exploitation, but the ease of exploitation by low-privileged authenticated users raises concern for insider threats or compromised accounts.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict user roles and permissions to minimize the number of users with Subscriber-level or higher access, especially on sites handling cryptocurrency transactions. Implement strict access controls and monitor user activity for unauthorized changes to plugin settings or contract addresses. Until an official patch is released, consider disabling the vulnerable plugin or replacing it with a secure alternative. If disabling is not feasible, apply custom code to enforce capability checks on the 'saveDeployedContract' function, ensuring only trusted administrator roles can modify contract addresses. Regularly audit WordPress options related to 'tokenico_deployed_contracts' for unauthorized modifications. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious requests targeting this function. Educate site administrators about the risks of granting unnecessary privileges and encourage strong authentication mechanisms such as multi-factor authentication to reduce the risk of account compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Singapore, South Korea, Japan, India, Brazil
CVE-2025-11773: CWE-862 Missing Authorization in beycanpress Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO
Description
The Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'saveDeployedContract' function in all versions up to, and including, 2.4.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the WordPress option `tokenico_deployed_contracts`, poisoning the smart contract addresses displayed.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-11773 affects the beycanpress WordPress plugin 'Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO' in all versions up to and including 2.4.6. The root cause is a missing authorization (capability) check in the 'saveDeployedContract' function, which is responsible for saving deployed smart contract addresses within the WordPress options database under the key 'tokenico_deployed_contracts'. Because of this missing check, any authenticated user with at least Subscriber-level privileges can invoke this function to overwrite the stored contract addresses. This unauthorized modification can lead to the display of malicious or incorrect smart contract addresses on the affected WordPress site. Attackers could exploit this to mislead investors or users interacting with the ICO or token launchpad, potentially redirecting funds or causing financial loss. The vulnerability does not require user interaction beyond authentication and has a CVSS 3.1 base score of 4.3, reflecting a medium severity primarily due to its limited impact on integrity and no impact on confidentiality or availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability falls under CWE-862 (Missing Authorization), emphasizing the importance of proper capability checks in WordPress plugin development.
Potential Impact
The primary impact of this vulnerability is on data integrity within affected WordPress sites using the beycanpress plugin. Unauthorized users with Subscriber-level access can alter smart contract addresses, potentially redirecting users to malicious contracts or invalid addresses. This can lead to financial losses for investors or users interacting with ICOs, presales, or token launches hosted on compromised sites. The trustworthiness and reputation of organizations running these platforms can be severely damaged. Although the vulnerability does not directly compromise confidentiality or availability, the manipulation of contract addresses can facilitate fraud, phishing, or theft of cryptocurrency assets. Organizations relying on this plugin for critical token sale infrastructure are at risk of targeted attacks, especially if they do not enforce strict user role management or monitor changes to contract data. The lack of known exploits suggests limited current exploitation, but the ease of exploitation by low-privileged authenticated users raises concern for insider threats or compromised accounts.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict user roles and permissions to minimize the number of users with Subscriber-level or higher access, especially on sites handling cryptocurrency transactions. Implement strict access controls and monitor user activity for unauthorized changes to plugin settings or contract addresses. Until an official patch is released, consider disabling the vulnerable plugin or replacing it with a secure alternative. If disabling is not feasible, apply custom code to enforce capability checks on the 'saveDeployedContract' function, ensuring only trusted administrator roles can modify contract addresses. Regularly audit WordPress options related to 'tokenico_deployed_contracts' for unauthorized modifications. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious requests targeting this function. Educate site administrators about the risks of granting unnecessary privileges and encourage strong authentication mechanisms such as multi-factor authentication to reduce the risk of account compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-14T23:38:10.444Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69202359cf2d47c38997b47e
Added to database: 11/21/2025, 8:31:21 AM
Last enriched: 2/27/2026, 7:21:15 PM
Last updated: 3/24/2026, 9:50:36 AM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.