[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fawuCxJwR5HFxEeV4nIFM9waSIo3GrQs3b6Rw0wbEURg":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2026-0808","spin-wheel-unauthenticated-client-side-prize-manipulation-via-prizeindex-parameter","Spin Wheel \u003C= 2.1.0 - Unauthenticated Client-Side Prize Manipulation via 'prize_index' Parameter","The Spin Wheel plugin for WordPress is vulnerable to client-side prize manipulation in all versions up to, and including, 2.1.0. This is due to the plugin trusting client-supplied prize selection data without server-side validation or randomization. This makes it possible for unauthenticated attackers to manipulate which prize they win by modifying the 'prize_index' parameter sent to the server, allowing them to always select the most valuable prizes.","spin-wheel",null,"\u003C=2.1.0","2.1.1","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Client-Side Enforcement of Server-Side Security","2026-01-16 18:09:30","2026-01-17 06:42:21",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fc023b91e-f633-41a6-b2d7-bcb3f1d026b7?source=api-prod",1]