Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12361: CWE-862 Missing Authorization in saadiqbal myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program.

0
Medium
VulnerabilityCVE-2025-12361cvecve-2025-12361cwe-862
Published: Fri Dec 19 2025 (12/19/2025, 09:29:47 UTC)
Source: CVE Database V5
Vendor/Project: saadiqbal
Product: myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program.

Description

The myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.9.7.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive information including user IDs, display names, and email addresses of all users on the site via the get_bank_accounts AJAX action. Passwords are not exposed.

AI-Powered Analysis

AILast updated: 12/26/2025, 10:29:32 UTC

Technical Analysis

CVE-2025-12361 is a vulnerability classified under CWE-862 (Missing Authorization) found in the myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program WordPress plugin, versions up to and including 2.9.7.1. The issue stems from the plugin's failure to properly verify that a user is authorized to perform certain actions, specifically within the get_bank_accounts AJAX endpoint. This endpoint can be accessed by authenticated users with Subscriber-level privileges or higher, allowing them to retrieve sensitive information such as user IDs, display names, and email addresses of all users registered on the WordPress site. Notably, passwords are not exposed, mitigating the risk of direct account compromise. The vulnerability requires the attacker to be authenticated but does not require any additional user interaction, making exploitation straightforward once access is obtained. The CVSS v3.1 base score is 4.3 (medium severity), with the vector indicating network attack vector, low attack complexity, privileges required at the level of a subscriber, no user interaction, unchanged scope, and limited confidentiality impact. No public exploits have been reported yet, but the exposure of user data can facilitate further attacks such as phishing or social engineering. The vulnerability affects all versions of the plugin up to 2.9.7.1, and no official patches have been linked at this time. The plugin is commonly used to manage gamification elements like points, ranks, badges, and loyalty programs on WordPress sites, which are popular in various sectors including e-commerce, education, and community platforms.

Potential Impact

For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of user information, which can compromise user privacy and violate data protection regulations such as the GDPR. Exposure of user IDs, display names, and email addresses can enable targeted phishing campaigns, social engineering attacks, and identity harvesting. While passwords are not exposed, the leaked information can be leveraged to attempt credential stuffing or spear-phishing attacks. Organizations relying on the myCred plugin for customer engagement or loyalty programs risk reputational damage and potential regulatory penalties if user data is mishandled. The vulnerability does not directly affect system integrity or availability but undermines trust and confidentiality. Given the widespread use of WordPress in Europe and the popularity of gamification plugins, the risk is non-negligible, especially for sectors with large user bases such as retail, education, and online communities. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

European organizations should immediately verify if their WordPress installations use the myCred plugin at or below version 2.9.7.1. In the absence of an official patch, administrators should consider the following mitigations: restrict plugin access to trusted users only by adjusting WordPress user roles and capabilities to limit Subscriber-level access; implement Web Application Firewall (WAF) rules to monitor and block suspicious AJAX requests targeting get_bank_accounts; disable or restrict AJAX actions related to the plugin if not essential; monitor logs for unusual access patterns or data requests; educate users about phishing risks stemming from leaked information; and maintain regular backups and update the plugin promptly once a patch is released. Additionally, organizations should conduct a privacy impact assessment to evaluate the exposure and notify affected users if necessary under GDPR requirements. Employing multi-factor authentication (MFA) can also reduce the risk of unauthorized authenticated access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T16:53:03.299Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69451dcdc326d36e537b0eb7

Added to database: 12/19/2025, 9:41:33 AM

Last enriched: 12/26/2025, 10:29:32 AM

Last updated: 2/7/2026, 11:33:18 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats