Skip to main content

CVE-2025-0856: CWE-862 Missing Authorization in Potenza Global Solutions PGS Core

High
VulnerabilityCVE-2025-0856cvecve-2025-0856cwe-862
Published: Tue May 06 2025 (05/06/2025, 22:22:31 UTC)
Source: CVE
Vendor/Project: Potenza Global Solutions
Product: PGS Core

Description

The PGS Core plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 5.8.0. This makes it possible for unauthenticated attackers to add, modify, or plugin options.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:12:34 UTC

Technical Analysis

CVE-2025-0856 is a high-severity vulnerability affecting the PGS Core plugin for WordPress, developed by Potenza Global Solutions. The vulnerability is classified under CWE-862, which corresponds to missing authorization checks. Specifically, the issue arises because multiple functions within the plugin lack proper capability checks, allowing unauthenticated attackers to perform unauthorized actions. These actions include adding, modifying, or deleting plugin options, which can lead to unauthorized access, data modification, and potential data loss. The vulnerability affects all versions up to and including 5.8.0 of the PGS Core plugin. The CVSS v3.1 base score is 7.3, indicating a high severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) shows that the attack can be performed remotely over the network without any privileges or user interaction, and it impacts confidentiality, integrity, and availability to a low to moderate extent. Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a significant risk, especially for websites relying on this plugin for critical functionality. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation. Since WordPress is widely used across Europe, and plugins like PGS Core are often deployed in various sectors, this vulnerability poses a tangible threat to the security posture of affected sites.

Potential Impact

For European organizations, this vulnerability can have several adverse effects. Unauthorized modification of plugin options can lead to website defacement, data leakage, or even the insertion of malicious code, which could compromise user data and trust. Organizations in sectors such as e-commerce, government, education, and media that rely on WordPress and the PGS Core plugin may face operational disruptions and reputational damage. The ability for unauthenticated attackers to exploit this vulnerability remotely increases the risk of widespread attacks, potentially leading to data breaches under GDPR regulations, which could result in significant fines and legal consequences. Additionally, the integrity and availability of websites could be compromised, affecting business continuity and customer engagement. Given the plugin’s role in managing core functionalities, attackers might leverage this access to pivot to other parts of the network or escalate privileges, further amplifying the impact.

Mitigation Recommendations

Immediate mitigation steps include disabling the PGS Core plugin until a security patch is released. Organizations should monitor official channels from Potenza Global Solutions and WordPress for updates or patches addressing CVE-2025-0856. In the interim, applying Web Application Firewall (WAF) rules to block suspicious requests targeting the plugin’s endpoints can reduce exposure. Conducting a thorough audit of WordPress user roles and permissions to ensure minimal privilege principles are enforced is recommended. Organizations should also implement strict monitoring and logging of plugin-related activities to detect any unauthorized changes promptly. Regular backups of website data and configurations should be maintained to enable quick restoration if compromise occurs. Finally, educating site administrators about the risks and signs of exploitation can improve early detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-29T18:41:52.271Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9bb5

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:12:34 PM

Last updated: 7/25/2025, 9:52:03 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats