myCred – Points Management System For Gamification, Ranks, Badges, …

myCred – Points Management System For Gamification, Ranks, Badges, …

by | Feb 13, 2026 | Plugins

Attack Vectors

CVE-2026-0550 is a Medium-severity vulnerability (CVSS 6.4) affecting the WordPress plugin myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program (slug: mycred) in versions up to and including 2.9.7.3.

The issue can be exploited by an authenticated WordPress user with Contributor-level access or higher, who can abuse the mycred_load_coupon shortcode by supplying malicious attributes. Because the injected content can be stored, the harmful script may run whenever someone visits the affected page.

In practical business terms, this means the risk is not limited to “hackers on the internet.” It can also involve compromised contributor accounts, overly broad internal permissions, outsourced content creators, or agencies with publishing access.

Security Weakness

The vulnerability is a Stored Cross-Site Scripting (XSS) condition caused by insufficient input sanitization and output escaping of user-supplied shortcode attributes in mycred_load_coupon.

Because the attacker only needs low privileges (Contributor+) and no user interaction is required for the script to execute (per the CVSS vector), this weakness increases the likelihood of silent exploitation—especially in organizations with many content authors, multiple sites, or shared logins.

Technical or Business Impacts

If exploited, this flaw can enable malicious scripts to run in the browser of anyone who views the injected page. Depending on who visits (customers, staff, admins), the impact may include theft of session data, unauthorized actions performed in a user’s session, or manipulation of page content.

For marketing and leadership teams, the larger risk often shows up as brand and revenue damage: compromised landing pages, altered calls-to-action, fraudulent coupon/loyalty messaging, reduced conversion due to trust loss, and potential compliance concerns if customer data or authenticated sessions are exposed.

Remediation: Update myCred to version 2.9.7.4 or a newer patched release. Also review who has Contributor (or higher) access, remove unused accounts, and ensure agencies/vendors have the minimum permissions needed.

Similar Attacks

Stored XSS is a common path to business-impacting incidents because it can weaponize normal content workflows. Examples of real-world web scripting and injection-related attack patterns include:

Equifax breach (BBC) — a web application vulnerability led to major business and compliance fallout

Magecart-style web skimming (Cloudflare overview) — injected scripts used to steal customer payment data

OWASP Cross-Site Scripting (XSS) — widely documented attack category and business risks

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers