Skip to main content

CVE-2025-49240: CWE-862 Missing Authorization in nK DocsPress

Medium
VulnerabilityCVE-2025-49240cvecve-2025-49240cwe-862
Published: Fri Jun 06 2025 (06/06/2025, 12:53:34 UTC)
Source: CVE Database V5
Vendor/Project: nK
Product: DocsPress

Description

Missing Authorization vulnerability in nK DocsPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects DocsPress: from n/a through 2.5.2.

AI-Powered Analysis

AILast updated: 07/08/2025, 00:25:08 UTC

Technical Analysis

CVE-2025-49240 is a Missing Authorization vulnerability (CWE-862) identified in the nK DocsPress product, affecting versions up to 2.5.2. This vulnerability arises from incorrectly configured access control security levels, allowing users with some level of privileges (as indicated by the CVSS vector requiring low privileges) to access resources or perform actions they should not be authorized to. Specifically, the vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The impact is limited to confidentiality loss (C:L) without affecting integrity or availability. This suggests that an attacker with some level of authenticated access could view or access sensitive information that should be restricted, but cannot modify or disrupt the system. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability was published recently in June 2025, indicating that organizations using DocsPress should be vigilant and monitor for forthcoming patches or mitigations.

Potential Impact

For European organizations, the confidentiality breach posed by this vulnerability could lead to unauthorized disclosure of sensitive documents or internal information managed via DocsPress. This could have regulatory implications, especially under GDPR, where unauthorized access to personal or confidential data can result in significant fines and reputational damage. While the vulnerability does not allow data modification or service disruption, the exposure of confidential information could facilitate further attacks such as social engineering or targeted phishing. Organizations in sectors handling sensitive data—such as finance, healthcare, legal, and government—may face heightened risks. Additionally, the medium severity rating suggests that while the risk is not critical, it should not be ignored, especially in environments where DocsPress is used to manage sensitive documentation.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Conduct an immediate audit of user roles and permissions within DocsPress to ensure the principle of least privilege is enforced, removing unnecessary access rights. 2) Implement network segmentation and restrict access to DocsPress instances to trusted internal networks or VPNs to reduce exposure to remote exploitation. 3) Enable and monitor detailed access logs to detect any unauthorized access attempts or unusual user behavior. 4) If possible, deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting DocsPress endpoints. 5) Prepare for rapid patch deployment by establishing a vulnerability management process that includes timely application of updates once available. 6) Educate users about the risks of unauthorized data access and encourage reporting of suspicious activity. These measures go beyond generic advice by focusing on access control auditing, network restrictions, and proactive monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:40:52.585Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842eddf71f4d251b5c880b6

Added to database: 6/6/2025, 1:32:15 PM

Last enriched: 7/8/2025, 12:25:08 AM

Last updated: 8/4/2025, 2:28:48 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats