CVE-2025-30958: CWE-862 Missing Authorization in onOffice GmbH onOffice for WP-Websites
Missing Authorization vulnerability in onOffice GmbH onOffice for WP-Websites allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects onOffice for WP-Websites: from n/a through 5.7.
AI Analysis
Technical Summary
CVE-2025-30958 is a Missing Authorization vulnerability (CWE-862) identified in onOffice GmbH's onOffice for WP-Websites product. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges to perform actions or access resources beyond their authorization. The affected product is a WordPress plugin or integration designed to facilitate real estate website management. The vulnerability affects versions up to 5.7, though specific version details are not fully enumerated. The CVSS v3.1 base score is 5.4, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) shows that the attack can be performed remotely over the network with low attack complexity, requires low privileges (authenticated user), no user interaction, and impacts integrity and availability but not confidentiality. The vulnerability does not require user interaction and does not escalate privileges but allows an authenticated user to perform unauthorized actions or cause denial of service or data integrity issues. No known exploits are currently in the wild, and no patches are linked yet, indicating that mitigation may require vendor updates or configuration changes once available. The root cause is an access control misconfiguration, a common issue where authorization checks are missing or insufficient, allowing privilege escalation or unauthorized operations within the application.
Potential Impact
For European organizations using onOffice for WP-Websites, particularly real estate agencies and property management firms, this vulnerability could lead to unauthorized modification or disruption of website content or backend data. Since the vulnerability affects integrity and availability, attackers with low-level authenticated access could alter listings, disrupt service availability, or manipulate data, potentially damaging business reputation and causing operational downtime. Confidential customer data is not directly impacted, but integrity issues could indirectly affect trust and compliance with data protection regulations like GDPR. The medium severity suggests a moderate risk, but exploitation could be more impactful in organizations relying heavily on the affected plugin for critical business functions. Additionally, the remote network attack vector means attackers could exploit this vulnerability from outside the organization if user credentials are compromised or weak, increasing the threat surface.
Mitigation Recommendations
Organizations should immediately audit user roles and permissions within onOffice for WP-Websites to ensure minimal privilege principles are enforced. Restrict access to the plugin’s administrative functions to trusted users only. Monitor logs for unusual activities indicative of unauthorized access or modifications. Since no patches are currently linked, coordinate with onOffice GmbH for timely updates or security advisories. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the plugin endpoints. Employ multi-factor authentication (MFA) for all users with access to the WordPress backend to reduce the risk of credential compromise. Regularly back up website data and configurations to enable quick recovery in case of integrity or availability attacks. Finally, consider isolating the WordPress environment or limiting network exposure to reduce attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium
CVE-2025-30958: CWE-862 Missing Authorization in onOffice GmbH onOffice for WP-Websites
Description
Missing Authorization vulnerability in onOffice GmbH onOffice for WP-Websites allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects onOffice for WP-Websites: from n/a through 5.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-30958 is a Missing Authorization vulnerability (CWE-862) identified in onOffice GmbH's onOffice for WP-Websites product. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges to perform actions or access resources beyond their authorization. The affected product is a WordPress plugin or integration designed to facilitate real estate website management. The vulnerability affects versions up to 5.7, though specific version details are not fully enumerated. The CVSS v3.1 base score is 5.4, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) shows that the attack can be performed remotely over the network with low attack complexity, requires low privileges (authenticated user), no user interaction, and impacts integrity and availability but not confidentiality. The vulnerability does not require user interaction and does not escalate privileges but allows an authenticated user to perform unauthorized actions or cause denial of service or data integrity issues. No known exploits are currently in the wild, and no patches are linked yet, indicating that mitigation may require vendor updates or configuration changes once available. The root cause is an access control misconfiguration, a common issue where authorization checks are missing or insufficient, allowing privilege escalation or unauthorized operations within the application.
Potential Impact
For European organizations using onOffice for WP-Websites, particularly real estate agencies and property management firms, this vulnerability could lead to unauthorized modification or disruption of website content or backend data. Since the vulnerability affects integrity and availability, attackers with low-level authenticated access could alter listings, disrupt service availability, or manipulate data, potentially damaging business reputation and causing operational downtime. Confidential customer data is not directly impacted, but integrity issues could indirectly affect trust and compliance with data protection regulations like GDPR. The medium severity suggests a moderate risk, but exploitation could be more impactful in organizations relying heavily on the affected plugin for critical business functions. Additionally, the remote network attack vector means attackers could exploit this vulnerability from outside the organization if user credentials are compromised or weak, increasing the threat surface.
Mitigation Recommendations
Organizations should immediately audit user roles and permissions within onOffice for WP-Websites to ensure minimal privilege principles are enforced. Restrict access to the plugin’s administrative functions to trusted users only. Monitor logs for unusual activities indicative of unauthorized access or modifications. Since no patches are currently linked, coordinate with onOffice GmbH for timely updates or security advisories. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the plugin endpoints. Employ multi-factor authentication (MFA) for all users with access to the WordPress backend to reduce the risk of credential compromise. Regularly back up website data and configurations to enable quick recovery in case of integrity or availability attacks. Finally, consider isolating the WordPress environment or limiting network exposure to reduce attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-03-26T09:22:20.465Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6842eddd71f4d251b5c8800f
Added to database: 6/6/2025, 1:32:13 PM
Last enriched: 7/8/2025, 3:41:02 AM
Last updated: 8/4/2025, 12:44:08 PM
Views: 11
Related Threats
CVE-2025-8690: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in addix Simple Responsive Slider
MediumCVE-2025-8688: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ebernstein Inline Stock Quotes
MediumCVE-2025-8685: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in emilien Wp chart generator
MediumCVE-2025-8621: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in odn Mosaic Generator
MediumCVE-2025-8568: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prabode GMap Generator
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.