CVE-2026-39691
Received Received - Intake
Missing Authorization in AdAstraCrypto Donation Box Allows Unauthorized Access

Publication date: 2026-04-08

Last updated on: 2026-04-13

Assigner: Patchstack

Description
Missing Authorization vulnerability in AdAstraCrypto Cryptocurrency Donation Box – Bitcoin & Crypto Donations cryptocurrency-donation-box allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Cryptocurrency Donation Box – Bitcoin & Crypto Donations: from n/a through <= 2.2.13.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-13
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
patchstack cryptocurrency_donation_box to 2.2.13 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-39691 is a Missing Authorization vulnerability in the WordPress plugin "Cryptocurrency Donation Box – Bitcoin & Crypto Donations" versions up to and including 2.2.13.

This vulnerability is classified as Broken Access Control, meaning that certain functions in the plugin lack proper authorization, authentication, or nonce token checks.

As a result, unauthenticated users can perform actions that should require higher privileges, potentially allowing them to misuse the plugin's features.

The issue falls under the OWASP Top 10 category A1: Broken Access Control.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability CVE-2026-39691 is a Broken Access Control issue in the Cryptocurrency Donation Box WordPress plugin, allowing unauthorized actions by unauthenticated users.

While the provided information does not explicitly mention compliance with standards such as GDPR or HIPAA, broken access control vulnerabilities can potentially lead to unauthorized access to sensitive data, which may result in non-compliance with data protection regulations.

However, the specific impact on compliance depends on the nature of the data handled by the affected plugin and whether unauthorized access leads to exposure of personal or protected health information.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability CVE-2026-39691 affects the WordPress plugin "Cryptocurrency Donation Box – Bitcoin & Crypto Donations" up to version 2.2.13 and involves missing authorization checks allowing unauthenticated users to perform privileged actions.

To detect this vulnerability on your system, you should first verify the plugin version installed on your WordPress site. If the version is 2.2.13 or earlier, it is potentially vulnerable.

Since this is a web application vulnerability related to access control, detection typically involves testing unauthorized access to restricted plugin functions or endpoints.

There are no specific commands provided in the available resources for detecting this vulnerability. However, common approaches include:

  • Check the plugin version via WordPress admin dashboard or by running a command like `wp plugin list` if WP-CLI is installed.
  • Use web application scanning tools or manual HTTP requests to attempt accessing plugin-specific URLs or API endpoints without authentication to see if unauthorized actions are possible.
  • Monitor web server logs for suspicious requests targeting the plugin's functionality.

For example, using curl or similar tools to send requests to plugin endpoints without authentication might help identify if access control is missing.


How can this vulnerability impact me? :

This vulnerability allows unauthenticated users to perform privileged actions within the plugin, which could lead to unauthorized manipulation of cryptocurrency donation functions.

Although the CVSS severity score is moderate (5.3), the impact is considered low priority by Patchstack due to its low impact and unlikely exploitation.

However, such vulnerabilities are often exploited in mass campaigns targeting many websites indiscriminately, which could expose affected sites to unauthorized access or misuse.

No official patch is currently available, so users are advised to update the plugin once a patch is released or seek mitigation assistance from their hosting provider or web developer.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is a Broken Access Control issue in the WordPress plugin "Cryptocurrency Donation Box – Bitcoin & Crypto Donations" up to version 2.2.13, allowing unauthenticated users to perform privileged actions.

Since no official patch is currently available, immediate mitigation steps include updating the plugin as soon as a patch is released.

In the meantime, users are advised to seek assistance from their hosting provider or web developer to implement temporary access control measures or other mitigations to reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart