Skip to main content

CVE-2025-23999: CWE-862 Missing Authorization in Cloudways Breeze

Medium
VulnerabilityCVE-2025-23999cvecve-2025-23999cwe-862
Published: Wed Jun 18 2025 (06/18/2025, 09:26:29 UTC)
Source: CVE Database V5
Vendor/Project: Cloudways
Product: Breeze

Description

Missing Authorization vulnerability in Cloudways Breeze allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Breeze: from n/a through 2.2.13.

AI-Powered Analysis

AILast updated: 06/18/2025, 09:49:53 UTC

Technical Analysis

CVE-2025-23999 is a Missing Authorization vulnerability (CWE-862) identified in Cloudways Breeze, a performance optimization plugin commonly used in web hosting environments managed via the Cloudways platform. This vulnerability arises due to incorrectly configured access control mechanisms, allowing users with limited privileges (requiring at least low-level privileges but no user interaction) to perform unauthorized actions that should be restricted. Specifically, the flaw permits privilege escalation in terms of integrity, where an attacker with some level of authenticated access can manipulate or alter certain system or application states without proper authorization checks. The vulnerability affects all versions of Breeze up to and including 2.2.13. The CVSS 3.1 base score is 4.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N. This means the attack can be performed remotely over the network with low attack complexity, requires privileges but no user interaction, and impacts integrity but not confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been published at the time of analysis. The vulnerability could be exploited by authenticated users to perform unauthorized modifications, potentially affecting the stability or correctness of the affected systems or applications but not leading to data disclosure or denial of service directly.

Potential Impact

For European organizations, the impact of CVE-2025-23999 primarily concerns the integrity of web applications and services relying on Cloudways Breeze for performance optimization. Since the vulnerability allows unauthorized modification actions by users with some level of access, attackers could manipulate configurations, alter performance settings, or inject malicious changes that degrade service quality or introduce further security risks. This could lead to compromised application behavior, potential data corruption, or indirect facilitation of further attacks. Organizations in sectors with stringent regulatory requirements (e.g., finance, healthcare, critical infrastructure) may face compliance risks if unauthorized changes go undetected. The lack of impact on confidentiality and availability reduces the risk of data breaches or service outages directly from this vulnerability, but the integrity compromise could still undermine trust and operational reliability. Given the medium severity and the requirement for some level of authenticated access, the threat is more relevant in environments where user privilege management is lax or where multiple users have access to the Breeze plugin settings.

Mitigation Recommendations

To mitigate CVE-2025-23999, European organizations should: 1) Immediately audit user privileges related to Cloudways Breeze administration and restrict access strictly to trusted administrators. 2) Implement robust role-based access controls (RBAC) to ensure that only authorized personnel can modify Breeze configurations. 3) Monitor and log all changes to Breeze settings to detect unauthorized modifications promptly. 4) Until an official patch is released, consider temporarily disabling Breeze or limiting its use to non-critical environments to reduce exposure. 5) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting Breeze endpoints. 6) Regularly review Cloudways and Breeze vendor communications for updates or patches addressing this vulnerability. 7) Conduct penetration testing focusing on access control weaknesses in the Breeze plugin to identify and remediate potential exploitation paths. These steps go beyond generic advice by focusing on access control tightening, monitoring, and temporary risk reduction strategies specific to the Breeze plugin context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-01-16T11:33:30.631Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6852882da8c921274387fa34

Added to database: 6/18/2025, 9:34:37 AM

Last enriched: 6/18/2025, 9:49:53 AM

Last updated: 8/5/2025, 12:55:11 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats