Impact
The Crypto plugin for WordPress allows attackers to trigger an unauthenticated AJAX action protected only by a public nonce, enabling the register and savenft methods to run without wallet signature verification. This flaw lets an unauthenticated user set a site‑wide transient that grants full access to all visitors for an hour and permits arbitrary data to be stored in the plugin’s custom_users table. The vulnerability is a classic instance of improper authentication (CWE‑306).
Affected Systems
Any WordPress site using the Crypto Tool plugin version 2.22 or earlier is vulnerable. These versions are distributed by the vendor odude and are intended for use on all compatible WordPress installations.
Risk and Exploitability
The CVSS score of 5.3 labels the issue as moderate, and the EPSS score of less than 1% indicates a very low probability of exploitation in the current market. Because the flaw is triggered by a simple HTTP request to wp_ajax_nopriv_crypto_connect_ajax_process with a valid nonce, no credentials are required. The vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment