CVE-2025-11773
BaseFortify
Publication date: 2025-11-21
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tokenico | tokenico | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the TokenICO plugin for WordPress, which is used for managing cryptocurrency tokens, launchpads, ICOs, IDOs, and airdrops. Due to a missing capability check on the 'saveDeployedContract' function in versions up to 2.4.6, authenticated users with Subscriber-level access or higher can modify data they should not be able to. Specifically, they can overwrite the WordPress option 'tokenico_deployed_contracts', which results in poisoning the smart contract addresses displayed by the plugin.
How can this vulnerability impact me? :
An attacker with at least Subscriber-level access can exploit this vulnerability to overwrite the smart contract addresses shown by the plugin. This could lead to displaying incorrect or malicious smart contract addresses, potentially misleading users or causing them to interact with fraudulent contracts, which may result in financial loss or damage to trust in the affected website.