Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12362: CWE-862 Missing Authorization in saadiqbal myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program.

0
Medium
VulnerabilityCVE-2025-12362cvecve-2025-12362cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 05:42:41 UTC)
Source: CVE Database V5
Vendor/Project: saadiqbal
Product: myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program.

Description

The myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.9.7. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to approve withdrawal requests, modify user point balances, and manipulate the payment processing system via the cashcred_pay_now AJAX action.

AI-Powered Analysis

AILast updated: 12/13/2025, 06:07:11 UTC

Technical Analysis

The myCred plugin for WordPress, widely used to manage points, gamification, ranks, badges, and loyalty programs, contains a vulnerability identified as CVE-2025-12362. This vulnerability is classified under CWE-862 (Missing Authorization) and affects all versions up to and including 2.9.7. The root cause is the plugin's failure to properly verify whether a user is authorized to perform certain sensitive actions. Specifically, the cashcred_pay_now AJAX action does not enforce authorization checks, allowing unauthenticated attackers to approve withdrawal requests, alter user point balances, and manipulate payment processing workflows. This can lead to unauthorized financial transactions or fraudulent point redemptions. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the lack of confidentiality and availability impact but significant integrity impact. No patches or known exploits are currently reported, but the vulnerability's nature makes it a target for attackers aiming to exploit loyalty or payment systems integrated with WordPress sites. Organizations relying on myCred for customer engagement or financial incentives should consider this a priority vulnerability.

Potential Impact

For European organizations, the impact primarily concerns the integrity of loyalty and payment systems integrated via the myCred plugin. Unauthorized manipulation of point balances and withdrawal approvals can lead to financial losses, fraud, and reputational damage. E-commerce platforms, membership sites, and businesses using gamification to drive customer engagement are particularly at risk. The vulnerability could be exploited to fraudulently redeem points or withdraw funds, undermining trust in the platform and potentially causing regulatory scrutiny under GDPR if customer data or transactions are affected indirectly. While availability and confidentiality are not directly impacted, the financial and operational consequences of integrity breaches can be significant. The risk is heightened for organizations with high transaction volumes or those operating in competitive markets where loyalty programs are critical to customer retention.

Mitigation Recommendations

1. Immediately restrict access to the cashcred_pay_now AJAX endpoint by implementing server-side access controls, such as IP whitelisting or requiring authentication tokens, until a patch is available. 2. Monitor logs for unusual activity related to point withdrawals or balance changes, setting alerts for anomalous patterns. 3. Disable or limit the use of the myCred plugin's withdrawal and payment features if not essential. 4. Apply principle of least privilege by ensuring only authorized roles can initiate withdrawal requests or modify points. 5. Engage with the plugin vendor or community to obtain and apply security patches as soon as they are released. 6. Conduct a security audit of all AJAX endpoints in WordPress installations to verify proper authorization checks are in place. 7. Educate site administrators about the risks and encourage regular updates of plugins and themes to reduce exposure to similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T17:02:30.340Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cff4ed69a8ed577177bff

Added to database: 12/13/2025, 5:53:18 AM

Last enriched: 12/13/2025, 6:07:11 AM

Last updated: 12/14/2025, 4:10:16 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats