CVE-2026-24581

5.4 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the WP Swings Points and Rewards for WooCommerce plugin that allows attackers to exploit incorrectly configured access controls. Affected users are those running the plugin on WordPress/WooCommerce sites with versions up to 2.9.5, potentially enabling unauthorized access to restricted functionality.

💻 Affected Systems

Products:
  • WP Swings Points and Rewards for WooCommerce
Versions: All versions up to and including 2.9.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce installed. The vulnerability exists in the plugin's access control mechanisms.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate user points, rewards, or administrative functions, potentially leading to financial fraud, privilege escalation, or data manipulation affecting all users.

🟠

Likely Case

Unauthorized users accessing restricted functionality to modify their own or other users' points/rewards, potentially obtaining discounts or rewards they shouldn't qualify for.

🟢

If Mitigated

With proper access controls and authentication checks, impact would be limited to authorized users only performing intended actions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but bypasses authorization checks. The vulnerability is in access control logic rather than complex technical flaws.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.6 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/points-and-rewards-for-woocommerce/vulnerability/wordpress-points-and-rewards-for-woocommerce-plugin-2-9-5-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Points and Rewards for WooCommerce'. 4. Click 'Update Now' if available, or download version 2.9.6+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate points-and-rewards-for-woocommerce

Restrict Access via Firewall

all

Implement web application firewall rules to restrict access to plugin endpoints

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for unauthorized point/reward modifications
  • Disable the plugin entirely and use alternative reward systems

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins

Check Version:

wp plugin get points-and-rewards-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is 2.9.6 or higher and test authorization controls

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to points/rewards endpoints
  • Unexpected point balance changes
  • Suspicious reward redemptions

Network Indicators:

  • Unusual API calls to /wp-json/points-and-rewards/ endpoints
  • Requests bypassing expected authentication flows

SIEM Query:

source="wordpress" AND (uri_path="/wp-json/points-and-rewards/" OR plugin="points-and-rewards-for-woocommerce") AND status=200 AND user_agent NOT IN ("admin_user_agents")

🔗 References

📤 Share & Export