Skip to main content

CVE-2025-26920: CWE-862 Missing Authorization in PressMaximum Customify

Medium
VulnerabilityCVE-2025-26920cvecve-2025-26920cwe-862
Published: Mon May 19 2025 (05/19/2025, 16:50:24 UTC)
Source: CVE
Vendor/Project: PressMaximum
Product: Customify

Description

Missing Authorization vulnerability in PressMaximum Customify allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Customify: from n/a through 0.4.8.

AI-Powered Analysis

AILast updated: 07/11/2025, 13:32:37 UTC

Technical Analysis

CVE-2025-26920 is a Missing Authorization vulnerability (CWE-862) identified in the PressMaximum Customify plugin, affecting versions up to 0.4.8. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges (requiring at least low privileges, PR:L) to perform unauthorized actions that should be restricted. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N). The impact primarily affects the integrity and availability of the affected system, as unauthorized modifications or disruptions can occur without compromising confidentiality. The CVSS v3.1 base score is 5.4 (medium severity), reflecting the moderate risk posed by this flaw. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because it undermines the principle of least privilege, potentially allowing attackers to escalate their capabilities within the system by bypassing authorization checks. Given that Customify is a WordPress plugin used for customization purposes, exploitation could lead to unauthorized changes in website appearance or functionality, potentially disrupting business operations or damaging reputation.

Potential Impact

For European organizations using the PressMaximum Customify plugin, this vulnerability could lead to unauthorized modifications of their websites, impacting the integrity and availability of their online presence. This could result in service disruptions, defacement, or loss of functionality, which may affect customer trust and business continuity. Although confidentiality is not directly impacted, the integrity and availability issues could indirectly lead to reputational damage and financial losses. Organizations in sectors relying heavily on their web presence, such as e-commerce, media, and public services, may experience more pronounced effects. Additionally, regulatory compliance under GDPR may be indirectly affected if service disruptions impact data processing or availability of services to data subjects.

Mitigation Recommendations

European organizations should immediately audit their use of the Customify plugin and verify the version in use. Until an official patch is released, it is advisable to restrict access to the WordPress admin and customization interfaces to trusted users only, employing strong role-based access controls. Implementing web application firewalls (WAFs) with rules to detect and block suspicious requests targeting Customify endpoints can help mitigate exploitation attempts. Monitoring logs for unusual activity related to customization features is critical to early detection. Organizations should also prepare for rapid deployment of patches once available and consider temporary disabling of the plugin if feasible without disrupting critical services. Regular backups of website configurations and content will aid in recovery if unauthorized changes occur.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-02-17T11:51:01.643Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb0b3

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/11/2025, 1:32:37 PM

Last updated: 8/11/2025, 9:07:47 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats