Impact
The myCred Points Management System plugin for WordPress has a missing authorization flaw that allows unauthenticated users to approve withdrawal requests, alter user point balances, and tamper with payment processing through the cashcred_pay_now AJAX action. This integrity violation could enable attackers to drain points, redistribute rewards, or manipulate payouts, potentially resulting in financial loss. The weakness is a classic authorization bypass, identified as CWE‑862.
Affected Systems
The vulnerability affects the myCred plugin by saadiqbal, specifically versions up to and including 2.9.7. WordPress sites running any of these releases are at risk.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, while an EPSS of less than 1% suggests a very low likelihood of active exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by sending unauthenticated HTTP requests to the cashcred_pay_now AJAX endpoint, bypassing all permission checks.
OpenCVE Enrichment