Impact
The TokenICO plugin for WordPress permits unauthenticated modification of presale counters because the 'createSaleRecord' function lacks proper authentication and capability checks. The missing access control allows an attacker to alter data that influences presale or ICO prize distribution, potentially skewing token allocations or pricing, thereby compromising the integrity of the launchpad. The vulnerability is classified as CWE-306, missing authentication.
Affected Systems
The affected product is the TokenICO Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop plugin for WordPress, provided by beycanpress. All released versions up to and including 2.4.7 are vulnerable; users running these versions should consider them at risk.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity. With an EPSS score of less than 1%, the likelihood of exploitation at this time is low, and the vulnerability is not listed in the CISA KEV catalog. However, the nature of the flaw—unauthenticated modification via a public REST API endpoint—provides a straightforward attack vector. Attackers can send crafted requests to the createSaleRecord endpoint without credentials, adjusting presale counters or altering tokens distributed through the platform.
OpenCVE Enrichment