Home

Description

The Crypto plugin for WordPress is vulnerable to Information exposure in all versions up to, and including, 2.22. This is due to the plugin registering an unauthenticated AJAX action (wp_ajax_nopriv_crypto_connect_ajax_process) that allows calling the register and savenft methods with only a publicly-available nonce check and no wallet signature verification. This makes it possible for unauthenticated attackers to set a site-wide global authentication state via a single transient, bypassing all access controls for ALL visitors to the site. The impact is complete bypass of [crypto-block] shortcode restrictions and page-level access controls, affecting all site visitors for one hour, plus the ability to inject arbitrary data into the plugin's custom_users table.

PUBLISHED Reserved 2025-10-20 | Published 2025-11-11 | Updated 2025-11-12 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-11-10:Disclosed

Credits

Jonas Benjamin Friedli finder

References

www.wordfence.com/...-e558-478e-bbfd-06616aeb566b?source=cve

plugins.trac.wordpress.org/...ypto_connect_ajax_register.php

plugins.trac.wordpress.org/...ypto_connect_ajax_register.php

plugins.trac.wordpress.org/...ypto_connect_ajax_register.php

plugins.trac.wordpress.org/...includes/class-crypto-user.php

cve.org (CVE-2025-11986)

nvd.nist.gov (CVE-2025-11986)

Download JSON