Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58678: CWE-862 Missing Authorization in PickPlugins Accordion

0
Medium
VulnerabilityCVE-2025-58678cvecve-2025-58678cwe-862
Published: Mon Sep 22 2025 (09/22/2025, 18:22:49 UTC)
Source: CVE Database V5
Vendor/Project: PickPlugins
Product: Accordion

Description

Missing Authorization vulnerability in PickPlugins Accordion allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Accordion: from n/a through 2.3.14.

AI-Powered Analysis

AILast updated: 09/30/2025, 01:33:47 UTC

Technical Analysis

CVE-2025-58678 is a Missing Authorization vulnerability classified under CWE-862 affecting the PickPlugins Accordion product, up to version 2.3.14. This vulnerability arises from incorrectly configured access control security levels, allowing users with limited privileges (requiring at least some level of authentication) to access or perform actions that should be restricted. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The CVSS v3.1 base score is 6.5, indicating a medium severity level. The impact primarily affects confidentiality, as the vulnerability allows unauthorized access to sensitive information, but does not affect integrity or availability. Since no patches or exploits in the wild are currently reported, this vulnerability represents a significant risk if left unmitigated, especially in environments where sensitive data is handled via the Accordion plugin. The lack of authorization checks could allow an authenticated but lower-privileged user to access data or functionality beyond their permissions, potentially leading to data leakage or exposure of sensitive content managed by the plugin.

Potential Impact

For European organizations, particularly those using WordPress or other CMS platforms with the PickPlugins Accordion plugin, this vulnerability could lead to unauthorized disclosure of sensitive information. This is especially critical for organizations handling personal data under GDPR regulations, where unauthorized data exposure can result in regulatory penalties and reputational damage. The vulnerability could be exploited by internal threat actors or external attackers who have obtained limited credentials, allowing them to escalate their access without requiring user interaction. This could compromise confidentiality of business-critical or personal data, impacting sectors such as finance, healthcare, education, and government agencies. The medium severity rating suggests that while the vulnerability is not immediately critical, it poses a tangible risk that could be leveraged in targeted attacks or combined with other vulnerabilities for greater impact.

Mitigation Recommendations

European organizations should immediately audit their use of the PickPlugins Accordion plugin, verifying the version in use and whether it is affected (up to 2.3.14). Since no official patch links are currently available, organizations should consider the following specific mitigations: 1) Restrict access to the plugin’s administrative and configuration interfaces strictly to trusted and highly privileged users; 2) Implement additional access control mechanisms at the web server or application firewall level to block unauthorized requests targeting the Accordion plugin endpoints; 3) Monitor logs for unusual access patterns or attempts to access restricted Accordion functionality; 4) If feasible, temporarily disable or replace the Accordion plugin until a vendor patch is released; 5) Educate administrators and users about the risk of privilege escalation through this plugin and enforce strong authentication and session management policies; 6) Keep abreast of vendor announcements and apply patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-03T09:03:46.831Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d194d1a6a0abbafb7a3cf2

Added to database: 9/22/2025, 6:26:25 PM

Last enriched: 9/30/2025, 1:33:47 AM

Last updated: 10/7/2025, 1:46:03 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats