CVE-2025-60086: Missing Authorization in Matt WP Voting Contest
Missing Authorization vulnerability in Matt WP Voting Contest wp-voting-contest allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Voting Contest: from n/a through <= 5.8.
AI Analysis
Technical Summary
CVE-2025-60086 is a missing authorization vulnerability identified in the Matt WP Voting Contest WordPress plugin, affecting versions up to and including 5.8. The flaw arises from incorrectly configured access control security levels, which allow unauthenticated attackers to access sensitive functionality or data without proper authorization checks. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The primary impact is on confidentiality, as attackers can retrieve protected information from the voting contest plugin, potentially exposing voter data or contest results that should be restricted. There is no impact on integrity or availability, meaning the attacker cannot modify data or disrupt service. Although no known exploits are currently reported in the wild, the high CVSS score of 7.5 reflects the significant risk posed by this vulnerability due to its ease of exploitation and sensitive data exposure. The vulnerability was reserved in late September 2025 and published in December 2025, but no official patches or mitigations have been linked yet. Organizations using this plugin should be aware of the risk and prepare to apply vendor patches or implement compensating controls. Given the widespread use of WordPress and the popularity of contest or voting plugins, this vulnerability could be leveraged to gather unauthorized information from websites running the affected plugin versions.
Potential Impact
For European organizations, the primary impact of CVE-2025-60086 is unauthorized disclosure of sensitive data managed by the WP Voting Contest plugin. This could include voter identities, contest entries, or other confidential information collected during voting processes. Such data exposure can lead to privacy violations, reputational damage, and potential regulatory non-compliance under GDPR. Although the vulnerability does not allow data modification or service disruption, the confidentiality breach alone can have serious consequences, especially for organizations conducting public or internal voting events. Attackers exploiting this flaw could gain insights into organizational decision-making processes or manipulate public perception by leaking sensitive contest data. The ease of exploitation without authentication increases the threat level, as any external attacker can attempt to access the vulnerable endpoints. European organizations with public-facing WordPress sites using this plugin are particularly at risk, especially those in sectors like media, marketing, political campaigns, or community engagement platforms that rely on voting contests. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
1. Monitor the vendor's official channels and security advisories for the release of a patch addressing CVE-2025-60086 and apply it promptly once available. 2. Until a patch is released, restrict access to the WP Voting Contest plugin endpoints by implementing web application firewall (WAF) rules that block unauthorized requests targeting the plugin's voting or contest functionalities. 3. Conduct an audit of WordPress user roles and permissions to ensure that only trusted users have administrative or editing capabilities related to the voting contest plugin. 4. Disable or deactivate the WP Voting Contest plugin if it is not essential to business operations to eliminate exposure. 5. Employ network segmentation and access controls to limit external access to the WordPress administration interface and plugin endpoints. 6. Implement logging and monitoring for unusual access patterns or attempts to exploit the plugin, enabling early detection of exploitation attempts. 7. Educate site administrators on the risks of installing plugins from unverified sources and encourage regular plugin updates and security reviews. 8. Consider alternative voting or contest plugins with a stronger security track record if immediate patching is not feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-60086: Missing Authorization in Matt WP Voting Contest
Description
Missing Authorization vulnerability in Matt WP Voting Contest wp-voting-contest allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Voting Contest: from n/a through <= 5.8.
AI-Powered Analysis
Technical Analysis
CVE-2025-60086 is a missing authorization vulnerability identified in the Matt WP Voting Contest WordPress plugin, affecting versions up to and including 5.8. The flaw arises from incorrectly configured access control security levels, which allow unauthenticated attackers to access sensitive functionality or data without proper authorization checks. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The primary impact is on confidentiality, as attackers can retrieve protected information from the voting contest plugin, potentially exposing voter data or contest results that should be restricted. There is no impact on integrity or availability, meaning the attacker cannot modify data or disrupt service. Although no known exploits are currently reported in the wild, the high CVSS score of 7.5 reflects the significant risk posed by this vulnerability due to its ease of exploitation and sensitive data exposure. The vulnerability was reserved in late September 2025 and published in December 2025, but no official patches or mitigations have been linked yet. Organizations using this plugin should be aware of the risk and prepare to apply vendor patches or implement compensating controls. Given the widespread use of WordPress and the popularity of contest or voting plugins, this vulnerability could be leveraged to gather unauthorized information from websites running the affected plugin versions.
Potential Impact
For European organizations, the primary impact of CVE-2025-60086 is unauthorized disclosure of sensitive data managed by the WP Voting Contest plugin. This could include voter identities, contest entries, or other confidential information collected during voting processes. Such data exposure can lead to privacy violations, reputational damage, and potential regulatory non-compliance under GDPR. Although the vulnerability does not allow data modification or service disruption, the confidentiality breach alone can have serious consequences, especially for organizations conducting public or internal voting events. Attackers exploiting this flaw could gain insights into organizational decision-making processes or manipulate public perception by leaking sensitive contest data. The ease of exploitation without authentication increases the threat level, as any external attacker can attempt to access the vulnerable endpoints. European organizations with public-facing WordPress sites using this plugin are particularly at risk, especially those in sectors like media, marketing, political campaigns, or community engagement platforms that rely on voting contests. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
1. Monitor the vendor's official channels and security advisories for the release of a patch addressing CVE-2025-60086 and apply it promptly once available. 2. Until a patch is released, restrict access to the WP Voting Contest plugin endpoints by implementing web application firewall (WAF) rules that block unauthorized requests targeting the plugin's voting or contest functionalities. 3. Conduct an audit of WordPress user roles and permissions to ensure that only trusted users have administrative or editing capabilities related to the voting contest plugin. 4. Disable or deactivate the WP Voting Contest plugin if it is not essential to business operations to eliminate exposure. 5. Employ network segmentation and access controls to limit external access to the WordPress administration interface and plugin endpoints. 6. Implement logging and monitoring for unusual access patterns or attempts to exploit the plugin, enabling early detection of exploitation attempts. 7. Educate site administrators on the risks of installing plugins from unverified sources and encourage regular plugin updates and security reviews. 8. Consider alternative voting or contest plugins with a stronger security track record if immediate patching is not feasible.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:20:02.782Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b04e4eb3efac3670038b
Added to database: 12/18/2025, 7:42:06 AM
Last enriched: 1/20/2026, 9:40:24 PM
Last updated: 2/7/2026, 12:21:20 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.