Skip to main content

CVE-2025-50039: CWE-862 Missing Authorization in vgwort VG WORT METIS

Medium
VulnerabilityCVE-2025-50039cvecve-2025-50039cwe-862
Published: Fri Jul 04 2025 (07/04/2025, 11:17:57 UTC)
Source: CVE Database V5
Vendor/Project: vgwort
Product: VG WORT METIS

Description

Missing Authorization vulnerability in vgwort VG WORT METIS allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects VG WORT METIS: from n/a through 2.0.0.

AI-Powered Analysis

AILast updated: 07/04/2025, 11:42:45 UTC

Technical Analysis

CVE-2025-50039 is a Missing Authorization vulnerability (CWE-862) identified in the VG WORT METIS software, a product by vgwort. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges (PR:L - privileges required: low) to perform unauthorized actions that should be restricted. The vulnerability affects versions up to 2.0.0, although the exact affected versions are not fully enumerated (noted as 'n/a'). The CVSS v3.1 base score is 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) indicates that the vulnerability is remotely exploitable over the network without user interaction, requires low privileges, and impacts the integrity of the system but not confidentiality or availability. Specifically, the vulnerability allows an attacker with some level of access to escalate their privileges or perform unauthorized modifications due to missing or improperly enforced authorization checks. This can lead to unauthorized data manipulation or configuration changes within the VG WORT METIS environment. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that remediation may still be pending or in development. VG WORT METIS is a software product used primarily in the context of VG WORT, a German organization related to copyright and royalty management for authors and publishers, implying that the software may be used in publishing and media sectors.

Potential Impact

For European organizations, particularly those involved in publishing, media, and copyright management, this vulnerability poses a significant risk to data integrity. Unauthorized modifications could lead to incorrect royalty calculations, fraudulent reporting, or manipulation of sensitive author and publisher data. Since VG WORT METIS is linked to VG WORT, which operates primarily in Germany but also impacts other European countries through copyright management, the integrity of financial and legal data is critical. Exploitation could undermine trust in royalty distribution systems and potentially cause financial losses or legal disputes. The remote exploitability without user interaction increases the risk of automated or targeted attacks. Although confidentiality and availability are not directly impacted, the integrity compromise can have cascading effects on business operations and compliance with European data protection and financial regulations.

Mitigation Recommendations

Organizations using VG WORT METIS should immediately review and tighten access control configurations to ensure proper authorization checks are enforced. Since no official patches are currently linked, temporary mitigations include restricting network access to the VG WORT METIS application to trusted IP ranges and enforcing strict user privilege management, ensuring users have the minimum necessary permissions. Monitoring and logging access to critical functions within the software should be enhanced to detect unauthorized attempts. Additionally, organizations should engage with vgwort for timely updates and patches and plan for rapid deployment once available. Conducting a thorough audit of current user roles and permissions within VG WORT METIS is critical to minimize the attack surface. Implementing network segmentation and applying application-layer firewalls can further reduce exposure. Finally, educating users about the risks of privilege misuse and establishing incident response plans tailored to potential integrity breaches will improve overall resilience.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:08:41.943Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6867b9f16f40f0eb72a049f5

Added to database: 7/4/2025, 11:24:33 AM

Last enriched: 7/4/2025, 11:42:45 AM

Last updated: 7/7/2025, 4:39:23 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats