Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11773: CWE-862 Missing Authorization in beycanpress Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO

0
Medium
VulnerabilityCVE-2025-11773cvecve-2025-11773cwe-862
Published: Fri Nov 21 2025 (11/21/2025, 07:31:57 UTC)
Source: CVE Database V5
Vendor/Project: beycanpress
Product: Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO

Description

The Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'saveDeployedContract' function in all versions up to, and including, 2.4.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the WordPress option `tokenico_deployed_contracts`, poisoning the smart contract addresses displayed.

AI-Powered Analysis

AILast updated: 11/28/2025, 08:45:12 UTC

Technical Analysis

CVE-2025-11773 is a vulnerability classified under CWE-862 (Missing Authorization) found in the beycanpress WordPress plugin 'Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO'. The issue arises because the 'saveDeployedContract' function lacks proper capability checks, allowing any authenticated user with at least Subscriber-level privileges to invoke it and overwrite the WordPress option 'tokenico_deployed_contracts'. This option stores the addresses of deployed smart contracts that the plugin displays and uses for cryptocurrency-related operations such as ICOs, IDOs, and airdrops. By poisoning these addresses, an attacker can cause the plugin to display or interact with malicious or attacker-controlled smart contracts, potentially redirecting funds or misleading users. The vulnerability affects all versions up to 2.4.6 and does not require user interaction beyond authentication. The CVSS 3.1 base score is 4.3 (medium), reflecting the low complexity of exploitation (low attack complexity), network attack vector, and limited impact on integrity without affecting confidentiality or availability. No patches or public exploits are currently available, but the risk lies in unauthorized data modification that can undermine trust and financial transactions within the affected WordPress sites.

Potential Impact

For European organizations, especially those operating cryptocurrency platforms, ICO launchpads, or token airdrops using WordPress with this plugin, the vulnerability poses a risk of unauthorized manipulation of smart contract addresses. This can lead to redirection of funds to attacker-controlled contracts, resulting in financial losses and damage to reputation. Since the attack requires only Subscriber-level access, insider threats or compromised low-privilege accounts can exploit this flaw. The integrity of token sale processes and associated smart contract interactions can be compromised, undermining user trust and regulatory compliance. Additionally, misinformation about contract addresses can cause confusion and potential legal liabilities. The impact is particularly significant for organizations in countries with active crypto markets and stringent financial regulations, where trust and transparency are critical.

Mitigation Recommendations

1. Immediately restrict Subscriber and other low-privilege user roles from accessing or invoking functions related to contract deployment or modification within the plugin, possibly by using role management plugins or custom code hooks. 2. Monitor and audit changes to the 'tokenico_deployed_contracts' WordPress option using logging plugins or custom monitoring to detect unauthorized modifications promptly. 3. Implement multi-factor authentication (MFA) for all authenticated users to reduce the risk of account compromise. 4. Isolate or sandbox WordPress installations used for cryptocurrency operations to limit exposure. 5. Engage with the plugin vendor or community to obtain or request a security patch; apply updates as soon as they become available. 6. Consider temporarily disabling the plugin or its vulnerable features if patching is not immediately possible, especially during active ICO or token sale periods. 7. Educate users and administrators about the risk of low-privilege account compromise and enforce strict user access policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-14T23:38:10.444Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69202359cf2d47c38997b47e

Added to database: 11/21/2025, 8:31:21 AM

Last enriched: 11/28/2025, 8:45:12 AM

Last updated: 1/7/2026, 8:47:23 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats