Skip to main content

CVE-2025-2798: CWE-269 Improper Privilege Management in XTENDIFY Woffice CRM

Critical
VulnerabilityCVE-2025-2798cvecve-2025-2798cwe-269
Published: Fri Apr 04 2025 (04/04/2025, 13:44:36 UTC)
Source: CVE Database V5
Vendor/Project: XTENDIFY
Product: Woffice CRM

Description

The Woffice CRM theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 5.4.21. This is due to a misconfiguration of excluded roles during registration. This makes it possible for unauthenticated attackers to register with an Administrator role if a custom login form is being used. This can be combined with CVE-2025-2797 to bypass the user approval process if an Administrator can be tricked into taking an action such as clicking a link.

AI-Powered Analysis

AILast updated: 07/10/2025, 22:34:30 UTC

Technical Analysis

CVE-2025-2798 is a critical security vulnerability affecting all versions of the Woffice CRM theme for WordPress up to and including version 5.4.21. The vulnerability arises from improper privilege management (CWE-269) due to a misconfiguration in the handling of excluded user roles during the registration process. Specifically, this flaw allows unauthenticated attackers to register accounts with Administrator privileges if a custom login form is in use. This bypasses normal authentication and role assignment controls, granting attackers full administrative access to the WordPress site running the Woffice CRM theme. The vulnerability can be further exploited in conjunction with CVE-2025-2797 to bypass user approval processes, for example by tricking an administrator into clicking a malicious link, thereby facilitating privilege escalation and persistent unauthorized access. The CVSS v3.1 base score of 9.8 reflects the high impact and ease of exploitation: the attack requires no authentication or user interaction, can be executed remotely over the network, and results in complete compromise of confidentiality, integrity, and availability of the affected system. No patches have been published yet, increasing the urgency for mitigation. Given the widespread use of WordPress and the popularity of Woffice CRM in managing business operations, this vulnerability poses a significant risk to organizations relying on this software for customer relationship management and internal collaboration.

Potential Impact

For European organizations, the impact of CVE-2025-2798 is severe. Successful exploitation grants attackers full administrative control over the WordPress site, enabling data theft, data manipulation, deployment of malware, ransomware, or use of the compromised site as a pivot point for further network intrusion. This can lead to exposure of sensitive customer and business data, disruption of business operations, reputational damage, and regulatory non-compliance, especially under GDPR. Organizations using Woffice CRM for critical business functions or storing personal data are at heightened risk. The ability to bypass authentication without user interaction makes this vulnerability particularly dangerous, as attacks can be automated and widespread. The potential combination with CVE-2025-2797 further exacerbates the risk by allowing attackers to circumvent approval workflows, increasing the likelihood of persistent and stealthy compromise.

Mitigation Recommendations

Immediate mitigation steps include disabling or restricting the use of custom login forms until a patch is available. Organizations should audit user roles and registrations to identify any unauthorized Administrator accounts and remove them promptly. Implementing web application firewalls (WAFs) with rules to detect and block suspicious registration attempts targeting the Woffice CRM plugin can reduce exposure. Monitoring logs for unusual registration activity or privilege escalations is critical. Restricting administrative access by IP whitelisting or multi-factor authentication (MFA) can limit the impact if exploitation occurs. Organizations should also prepare to apply patches or updates from XTENDIFY as soon as they are released. In the interim, consider isolating WordPress instances running Woffice CRM from critical internal networks to minimize lateral movement. Educating administrators about phishing and social engineering risks related to CVE-2025-2797 is also advised to prevent combined exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-25T18:00:21.111Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5b1b0bd07c3938bd3a

Added to database: 6/10/2025, 6:54:19 PM

Last enriched: 7/10/2025, 10:34:30 PM

Last updated: 8/1/2025, 2:41:08 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats