๐Ÿ” CVE Alert

CVE-2025-11988

MEDIUM 5.3

Crypto Tool <= 2.22 - Missing Authentication to Unauthenticated Limited File Deletion

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

The Crypto plugin for WordPress is vulnerable to unauthorized manipulation of data in all versions up to, and including, 2.22. This is due to the plugin registering an unauthenticated AJAX action (wp_ajax_nopriv_crypto_connect_ajax_process) that allows calling the crypto_delete_json method with only a publicly-available nonce check. This makes it possible for unauthenticated attackers to delete specific JSON files matching the pattern *_pending.json within the wp-content/uploads/yak/ directory, causing data loss and denial of service for plugin workflows that rely on these artifacts.

CWE CWE-862
Vendor odude
Product crypto tool
Published Nov 11, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for odude crypto tool

Be the first to know when new medium vulnerabilities affecting odude crypto tool are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

odude / Crypto Tool
0 โ‰ค 2.22

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/3281d6eb-9f14-43d4-a4d4-532993039e53?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/crypto/tags/2.22/includes/class-crypto_connect_ajax_register.php#L9 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/crypto/tags/2.22/includes/class-crypto_connect_ajax_register.php#L137

Credits

Jonas Benjamin Friedli