Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59567: CWE-862 Missing Authorization in Elliot Sowersby / RelyWP Coupon Affiliates

0
Medium
VulnerabilityCVE-2025-59567cvecve-2025-59567cwe-862
Published: Mon Sep 22 2025 (09/22/2025, 18:26:00 UTC)
Source: CVE Database V5
Vendor/Project: Elliot Sowersby / RelyWP
Product: Coupon Affiliates

Description

Missing Authorization vulnerability in Elliot Sowersby / RelyWP Coupon Affiliates allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Coupon Affiliates: from n/a through 6.8.0.

AI-Powered Analysis

AILast updated: 09/30/2025, 01:04:52 UTC

Technical Analysis

CVE-2025-59567 is a Missing Authorization vulnerability (CWE-862) identified in the Coupon Affiliates plugin developed by Elliot Sowersby / RelyWP, affecting versions up to 6.8.0. This vulnerability arises from incorrectly configured access control mechanisms, allowing unauthorized users with certain privileges to perform actions or access resources they should not be authorized to. The CVSS 3.1 base score is 4.3 (medium severity), indicating a moderate risk. The vector string CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L shows that the attack can be performed remotely over the network (AV:N) but requires high attack complexity (AC:H) and privileges (PR:H), with no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is low (C:L/I:L/A:L), suggesting limited data exposure or modification and minor service disruption. The vulnerability is related to missing or improper authorization checks, which can allow privileged users to escalate their permissions or access unauthorized functions within the Coupon Affiliates plugin. Coupon Affiliates is a WordPress plugin used to manage affiliate coupon campaigns, commonly employed by e-commerce and marketing websites to track and manage affiliate referrals and discounts. The lack of a patch link indicates that a fix may not yet be publicly available, and no known exploits are currently reported in the wild. Organizations using this plugin should be aware of the risk of privilege escalation or unauthorized access within their affiliate management systems, which could lead to manipulation of affiliate data, fraudulent coupon usage, or unauthorized changes to affiliate configurations.

Potential Impact

For European organizations, especially those relying on WordPress-based e-commerce or marketing platforms utilizing the Coupon Affiliates plugin, this vulnerability poses a moderate risk. Unauthorized access or privilege escalation within affiliate management can lead to financial losses through fraudulent coupon redemptions, manipulation of affiliate commissions, and potential reputational damage if affiliate data integrity is compromised. Additionally, attackers gaining unauthorized access might leverage this foothold to pivot to other parts of the web infrastructure, potentially exposing customer data or disrupting services. Given the medium severity and requirement for high privileges, the threat is more relevant to internal users or compromised accounts rather than external attackers without credentials. However, in environments where privilege management is lax or where multiple administrators exist, the risk increases. The impact on confidentiality, integrity, and availability, while low individually, can cumulatively affect business operations and trust in affiliate marketing programs.

Mitigation Recommendations

1. Immediate review and tightening of access control policies within the Coupon Affiliates plugin settings and WordPress user roles to ensure that only trusted users have high-level privileges. 2. Implement the principle of least privilege by auditing and minimizing the number of users with administrative or high-level access to the affiliate management system. 3. Monitor logs for unusual activities related to affiliate coupon creation, modification, or deletion to detect potential exploitation attempts early. 4. Until an official patch is released, consider disabling or restricting the Coupon Affiliates plugin functionality that involves sensitive operations or restrict access to it via network-level controls such as IP whitelisting or VPN access. 5. Stay updated with vendor advisories and apply patches promptly once available. 6. Conduct regular security assessments and penetration testing focusing on authorization controls within WordPress plugins, especially those handling financial or marketing data. 7. Educate administrators and users with elevated privileges about the risks of privilege misuse and the importance of secure credential management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-17T18:00:53.705Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d197d805d26ef415250935

Added to database: 9/22/2025, 6:39:20 PM

Last enriched: 9/30/2025, 1:04:52 AM

Last updated: 10/7/2025, 10:19:37 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats