CVE-2025-59567
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-22

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Missing Authorization vulnerability in Elliot Sowersby / RelyWP Coupon Affiliates woo-coupon-usage allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Coupon Affiliates: from n/a through <= 6.8.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-22
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2025-09-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
relywp coupon_affiliates *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-59567 is a Broken Access Control vulnerability in the WordPress Coupon Affiliates Plugin versions up to 6.8.0. It occurs due to missing authorization, authentication, or nonce token checks in certain plugin functions, allowing users with low privileges (Subscriber-level) to perform actions meant for higher-privileged users. This flaw enables unauthorized privilege escalation and is classified under OWASP Top 10 category A1: Broken Access Control. [1]


How can this vulnerability impact me? :

This vulnerability can allow an attacker with low-level access to escalate their privileges and perform actions reserved for higher-privileged users within the Coupon Affiliates Plugin. This could lead to unauthorized changes or access within the affected WordPress site. Although it has a low severity rating and is considered unlikely to be exploited, exploitation could compromise site integrity and security. Patchstack recommends updating to version 6.8.1 or later and offers virtual patching to mitigate the risk. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking if the installed Coupon Affiliates Plugin version is 6.8.0 or earlier, as these versions contain the broken access control flaw. There are no specific network or system commands provided to detect exploitation attempts. It is recommended to monitor for unauthorized privilege escalation attempts by users with Subscriber-level privileges performing higher-privileged actions. For incident response, professional server-side malware scanning is advised rather than relying on plugin-based scanners. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Coupon Affiliates Plugin to version 6.8.1 or later, where the vulnerability is fixed. Alternatively, applying virtual patching (vPatching) offered by Patchstack can provide rapid protection without performance loss before official patches are applied. Additionally, monitoring for exploitation attempts and preparing for professional incident response and server-side malware scanning in case of compromise are recommended. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart