Impact
The myCred Points Management System for WordPress suffers from a missing authorization flaw for the get_bank_accounts AJAX action in versions up to 2.9.7.1. Authenticated users with at least Subscriber role can trigger this action and retrieve identifiers, display names, and email addresses of all site users, but passwords are not exposed. The vulnerability is rooted in improper access control (CWE-862) and results in the unintended disclosure of personally identifiable information.
Affected Systems
WordPress sites that have the myCred plugin version 2.9.7.1 or older installed. The affected vendor is saadiqbal, and the product is the myCred Points Management System for Gamification, Ranks, Badges, and Loyalty Rewards Program. Any site using these versions is susceptible.
Risk and Exploitability
The CVSS score is 4.3, indicating moderate severity, and the EPSS score of less than 1% reflects a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers must be authenticated and have at least Subscriber privileges; no privilege escalation is needed. The impact is limited to exposure of potentially sensitive personal data rather than system compromise.
OpenCVE Enrichment