CVE-2025-59567

5.5 MEDIUM

📋 TL;DR

A missing authorization vulnerability in the Elliot Sowersby / RelyWP Coupon Affiliates WordPress plugin allows attackers to bypass access controls and perform unauthorized actions, such as accessing or modifying coupon affiliate data. This affects all WordPress sites using the plugin from versions before 6.8.0, potentially compromising affiliate program integrity and sensitive information.

💻 Affected Systems

Products:
  • Elliot Sowersby / RelyWP Coupon Affiliates WordPress plugin
Versions: from n/a through 6.8.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability affects all default installations of the plugin within the specified version range, with no special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate or steal affiliate coupon data, leading to financial fraud, unauthorized affiliate payouts, or exposure of sensitive user information.

🟠

Likely Case

Unauthorized users gain access to restricted plugin functions, such as viewing or editing affiliate settings, which could disrupt affiliate operations or leak minor data.

🟢

If Mitigated

With proper access controls and patching, the risk is minimal, limited to low-impact information disclosure if other security measures are in place.

🌐 Internet-Facing: HIGH, as WordPress plugins are typically exposed to the internet, making them accessible to remote attackers without authentication in some configurations.
🏢 Internal Only: MEDIUM, as internal users might exploit the flaw to escalate privileges or access unauthorized data within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation likely requires some level of user interaction or knowledge of the plugin's functions, but no public proof-of-concept is available as of now.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 6.8.0 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/woo-coupon-usage/vulnerability/wordpress-coupon-affiliates-plugin-6-8-0-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into the WordPress admin dashboard. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Coupon Affiliates' and check if an update is available. 4. Click 'Update Now' to upgrade to version 6.8.0 or higher. 5. Verify the update completes successfully.

🔧 Temporary Workarounds

Disable the plugin temporarily

WordPress

Temporarily deactivate the Coupon Affiliates plugin to prevent exploitation until a patch can be applied.

wp plugin deactivate coupon-affiliates

🧯 If You Can't Patch

  • Implement strict access controls and role-based permissions in WordPress to limit plugin access to trusted users only.
  • Monitor logs for unauthorized access attempts to the plugin's admin pages and review affiliate data regularly for anomalies.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is below 6.8.0, it is vulnerable.

Check Version:

wp plugin get coupon-affiliates --field=version

Verify Fix Applied:

After updating, confirm the plugin version is 6.8.0 or higher in the same location and test access controls to ensure unauthorized actions are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access logs to WordPress admin pages related to coupon affiliates, such as /wp-admin/admin.php?page=coupon-affiliates from unauthorized IPs or users.

Network Indicators:

  • HTTP requests to plugin-specific endpoints without proper authentication headers or from unexpected sources.

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin.php?page=coupon-affiliates" AND user_role!="administrator")

🔗 References

📤 Share & Export