Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0808: CWE-602 Client-Side Enforcement of Server-Side Security in bdthemes Spin Wheel – Interactive spinning wheel that offers coupons

0
Medium
VulnerabilityCVE-2026-0808cvecve-2026-0808cwe-602
Published: Sat Jan 17 2026 (01/17/2026, 06:42:20 UTC)
Source: CVE Database V5
Vendor/Project: bdthemes
Product: Spin Wheel – Interactive spinning wheel that offers coupons

Description

The Spin Wheel plugin for WordPress is vulnerable to client-side prize manipulation in all versions up to, and including, 2.1.0. This is due to the plugin trusting client-supplied prize selection data without server-side validation or randomization. This makes it possible for unauthenticated attackers to manipulate which prize they win by modifying the 'prize_index' parameter sent to the server, allowing them to always select the most valuable prizes.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:41:34 UTC

Technical Analysis

The vulnerability identified as CVE-2026-0808 affects the bdthemes Spin Wheel plugin for WordPress, a tool that offers interactive spinning wheels for coupon distribution. The core issue is a CWE-602 weakness, where the plugin relies solely on client-side enforcement for prize selection security. Specifically, the plugin accepts a 'prize_index' parameter from the client without validating or randomizing it on the server side. This design flaw allows an unauthenticated attacker to manipulate the parameter value to always win the most valuable prize, bypassing intended randomization and fairness mechanisms. The vulnerability impacts all versions up to and including 2.1.0. The CVSS 3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. No patches have been released yet, and no known exploits are reported in the wild. The vulnerability undermines the integrity of the prize awarding process, potentially leading to unauthorized coupon issuance and financial losses for businesses relying on the plugin for promotions. The root cause is the failure to implement server-side validation and randomization, a fundamental security best practice for any client-server interaction involving rewards or sensitive operations.

Potential Impact

The primary impact of CVE-2026-0808 is the loss of integrity in the prize awarding mechanism of the Spin Wheel plugin. Attackers can exploit this flaw to fraudulently claim high-value coupons or rewards, leading to direct financial losses for organizations using the plugin in their marketing campaigns. This can also result in reputational damage, as customers may lose trust in promotional fairness. Additionally, widespread exploitation could disrupt promotional campaigns and skew analytics data, affecting business decision-making. Since the vulnerability requires no authentication or user interaction, it can be exploited at scale by automated scripts, increasing the risk of mass abuse. While confidentiality and availability are not directly impacted, the integrity breach alone can have significant operational and financial consequences, especially for e-commerce sites and businesses heavily reliant on coupon-based promotions.

Mitigation Recommendations

To mitigate CVE-2026-0808, organizations should immediately implement server-side validation and randomization of the prize selection process. This involves ignoring or not trusting the client-supplied 'prize_index' parameter and instead generating the prize outcome exclusively on the server side using secure randomization methods. If an official patch is released by bdthemes, it should be applied promptly. Until then, administrators can consider disabling the Spin Wheel plugin or restricting its use to trusted users only. Monitoring and logging prize claims for anomalies can help detect exploitation attempts. Additionally, applying web application firewall (WAF) rules to detect and block suspicious requests manipulating the 'prize_index' parameter may reduce risk. Educating marketing and IT teams about the vulnerability and its implications will aid in timely response and risk management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-09T14:36:32.229Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696b3178b22c7ad86896536b

Added to database: 1/17/2026, 6:51:36 AM

Last enriched: 2/26/2026, 6:41:34 PM

Last updated: 3/25/2026, 3:00:52 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses