Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by …

Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by …

by | Feb 13, 2026 | Plugins

Attack Vectors

Severity: Medium (CVSS 5.3) — CVE-2025-11771 affects the WordPress plugin Cryptocurrency (Token), Launchpad (Presale), ICO & IDO, Airdrop by TokenICO (slug: tokenico-cryptocurrency-token-launchpad-presale-ico-ido-airdrop) in versions up to and including 2.4.7.

The issue allows an unauthenticated attacker (someone who is not logged in) to modify presale-related data because the plugin’s createSaleRecord function lacks required authentication and authorization checks. In practical terms, this can enable external parties to manipulate presale counters without permission.

Security Weakness

The core weakness is missing authentication and capability checks for a function that updates presale data. When security controls are not enforced at the point where data changes occur, WordPress cannot reliably ensure that only authorized users (e.g., admins or designated staff) can submit those updates.

This vulnerability is described as an “unauthenticated and unauthorized modification of data” risk, where the likely outcome is tampering with presale counters rather than theft of sensitive information.

Technical or Business Impacts

For marketing directors and business owners, the primary risk is trust and integrity—if presale counters are manipulated, stakeholders may see inaccurate performance signals (e.g., demand, momentum, scarcity). This can undermine campaign credibility, partner confidence, and customer decision-making.

Operationally, teams may spend time investigating discrepancies, responding to complaints, and correcting public-facing metrics. For compliance and leadership (CEO/COO/CFO), even a Medium-severity issue can create reputational exposure if investors, customers, or partners believe reporting is unreliable.

Recommended remediation: Update the plugin to version 2.4.8 or newer, which contains the fix. Reference: CVE-2025-11771 and the advisory source from Wordfence.

Similar Attacks

Unauthenticated data-modification issues are a common pattern in WordPress ecosystems, especially when plugins expose update functions without enforcing permission checks. This category of weakness is frequently used to tamper with site content, business metrics, or transactional records.

Examples of widely documented plugin-related security incidents and advisories include:

Elementor Pro (2020) — vulnerability advisory and impact discussion (Wordfence)

Easy WP SMTP (2019) — vulnerability advisory (Wordfence)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers