Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12362: CWE-862 Missing Authorization in saadiqbal myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program.

0
Medium
VulnerabilityCVE-2025-12362cvecve-2025-12362cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 05:42:41 UTC)
Source: CVE Database V5
Vendor/Project: saadiqbal
Product: myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program.

Description

The myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.9.7. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to approve withdrawal requests, modify user point balances, and manipulate the payment processing system via the cashcred_pay_now AJAX action.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:24:12 UTC

Technical Analysis

CVE-2025-12362 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program WordPress plugin developed by saadiqbal. The issue exists in all versions up to and including 2.9.7. The root cause is the plugin's failure to properly verify that a user is authorized to perform certain sensitive actions, specifically those handled by the AJAX action cashcred_pay_now. This flaw enables unauthenticated attackers to approve withdrawal requests, alter user point balances, and manipulate payment processing workflows without any authentication or user interaction. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N). The impact is limited to integrity (I:L) with no confidentiality or availability effects. The vulnerability was reserved on 2025-10-27 and published on 2025-12-13, with no public patches or known exploits reported yet. The plugin is widely used in WordPress environments for gamification and loyalty programs, making the flaw a significant risk for sites relying on point-based reward systems. Attackers exploiting this vulnerability could fraudulently approve payments or manipulate points, potentially causing financial loss and reputational damage. The absence of authentication checks in a critical payment-related AJAX endpoint is a serious design oversight that must be addressed promptly.

Potential Impact

The primary impact of CVE-2025-12362 is the unauthorized modification of user point balances and fraudulent approval of withdrawal requests within the myCred plugin environment. This compromises the integrity of the points and payment systems, potentially leading to financial losses for organizations relying on these gamification and loyalty programs. Attackers could manipulate the system to grant themselves or others unauthorized rewards or cashouts, undermining trust in the platform. While confidentiality and availability are not directly affected, the integrity breach can disrupt business operations, cause customer dissatisfaction, and lead to revenue loss. Organizations using myCred in e-commerce, membership, or loyalty contexts face risks of fraud and abuse. The vulnerability’s ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and mass exploitation attempts. The lack of known exploits in the wild currently limits immediate risk, but the vulnerability remains a significant threat if weaponized.

Mitigation Recommendations

1. Immediately update the myCred plugin to a patched version once available from the vendor or developer. Monitor official channels for patch releases. 2. Until a patch is released, restrict access to the cashcred_pay_now AJAX endpoint by implementing web application firewall (WAF) rules that block unauthenticated requests or requests from suspicious IP addresses. 3. Employ WordPress security plugins that can monitor and block unauthorized AJAX actions or anomalous user behavior related to point transactions. 4. Review and harden user roles and permissions within WordPress to minimize the risk of privilege escalation or unauthorized actions. 5. Conduct regular audits of point balances and withdrawal approvals to detect suspicious activity promptly. 6. Consider disabling or limiting the use of the myCred plugin’s payment and withdrawal features if they are not essential until the vulnerability is resolved. 7. Implement network-level protections such as IP whitelisting or VPN access for administrative AJAX endpoints where feasible. 8. Educate site administrators about the risks and signs of exploitation to enable rapid incident response. These measures go beyond generic advice by focusing on immediate containment of the vulnerable AJAX action and operational controls to detect and prevent abuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T17:02:30.340Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cff4ed69a8ed577177bff

Added to database: 12/13/2025, 5:53:18 AM

Last enriched: 2/27/2026, 8:24:12 PM

Last updated: 3/24/2026, 12:22:01 AM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses