CVE-2025-60122: CWE-862 Missing Authorization in HivePress HivePress Claim Listings
Missing Authorization vulnerability in HivePress HivePress Claim Listings allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects HivePress Claim Listings: from n/a through 1.1.3.
AI Analysis
Technical Summary
CVE-2025-60122 is a Missing Authorization vulnerability (CWE-862) identified in the HivePress Claim Listings plugin, affecting versions up to 1.1.3. This vulnerability arises from improperly configured access control mechanisms within the plugin, allowing users with limited privileges (requiring at least some level of authentication) to perform actions or access resources beyond their authorization scope. Specifically, the flaw permits privilege escalation or unauthorized modification of listing claims without proper verification of user permissions. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and needs privileges (PR:L) but does not require user interaction (UI:N). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. The impact affects integrity (I:L) but not confidentiality or availability, indicating attackers can alter data or listings but cannot read sensitive information or cause denial of service. The CVSS v3.1 base score is 4.3, categorizing it as a medium severity issue. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could be leveraged by authenticated users to manipulate listing claims, potentially leading to fraudulent listings or unauthorized content modifications within websites using HivePress Claim Listings, which is a WordPress plugin commonly used for directory and listing management.
Potential Impact
For European organizations, especially those operating online marketplaces, directories, or classified listing platforms using HivePress Claim Listings, this vulnerability poses a risk of unauthorized data manipulation. Attackers with low-level authenticated access could alter listing claims, potentially damaging the integrity of business-critical data, misleading customers, or facilitating fraud. This could result in reputational damage, loss of customer trust, and potential regulatory scrutiny under GDPR if manipulated data leads to privacy or consumer protection issues. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact could disrupt business operations and lead to financial losses. Organizations relying on HivePress for managing user-generated content should be aware that attackers might exploit this flaw to escalate privileges within the application, affecting the reliability of their listings and associated services.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement compensating controls immediately. These include: 1) Restricting user roles and permissions tightly within WordPress to minimize the number of users with claim listing privileges; 2) Monitoring and logging all claim listing modifications to detect suspicious activities promptly; 3) Applying web application firewall (WAF) rules to detect and block anomalous requests targeting claim listing endpoints; 4) Conducting regular audits of listing claims to identify unauthorized changes; 5) Temporarily disabling the Claim Listings feature if feasible until a patch is available; 6) Keeping WordPress core and all plugins updated to the latest versions to reduce attack surface; 7) Educating administrators and users about the risk and encouraging strong authentication practices to prevent unauthorized access. Once a patch is released, prioritize immediate deployment to remediate the vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-60122: CWE-862 Missing Authorization in HivePress HivePress Claim Listings
Description
Missing Authorization vulnerability in HivePress HivePress Claim Listings allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects HivePress Claim Listings: from n/a through 1.1.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-60122 is a Missing Authorization vulnerability (CWE-862) identified in the HivePress Claim Listings plugin, affecting versions up to 1.1.3. This vulnerability arises from improperly configured access control mechanisms within the plugin, allowing users with limited privileges (requiring at least some level of authentication) to perform actions or access resources beyond their authorization scope. Specifically, the flaw permits privilege escalation or unauthorized modification of listing claims without proper verification of user permissions. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and needs privileges (PR:L) but does not require user interaction (UI:N). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. The impact affects integrity (I:L) but not confidentiality or availability, indicating attackers can alter data or listings but cannot read sensitive information or cause denial of service. The CVSS v3.1 base score is 4.3, categorizing it as a medium severity issue. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could be leveraged by authenticated users to manipulate listing claims, potentially leading to fraudulent listings or unauthorized content modifications within websites using HivePress Claim Listings, which is a WordPress plugin commonly used for directory and listing management.
Potential Impact
For European organizations, especially those operating online marketplaces, directories, or classified listing platforms using HivePress Claim Listings, this vulnerability poses a risk of unauthorized data manipulation. Attackers with low-level authenticated access could alter listing claims, potentially damaging the integrity of business-critical data, misleading customers, or facilitating fraud. This could result in reputational damage, loss of customer trust, and potential regulatory scrutiny under GDPR if manipulated data leads to privacy or consumer protection issues. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact could disrupt business operations and lead to financial losses. Organizations relying on HivePress for managing user-generated content should be aware that attackers might exploit this flaw to escalate privileges within the application, affecting the reliability of their listings and associated services.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement compensating controls immediately. These include: 1) Restricting user roles and permissions tightly within WordPress to minimize the number of users with claim listing privileges; 2) Monitoring and logging all claim listing modifications to detect suspicious activities promptly; 3) Applying web application firewall (WAF) rules to detect and block anomalous requests targeting claim listing endpoints; 4) Conducting regular audits of listing claims to identify unauthorized changes; 5) Temporarily disabling the Claim Listings feature if feasible until a patch is available; 6) Keeping WordPress core and all plugins updated to the latest versions to reduce attack surface; 7) Educating administrators and users about the risk and encouraging strong authentication practices to prevent unauthorized access. Once a patch is released, prioritize immediate deployment to remediate the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:20:29.870Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d692e0828ba7f61ebe57b9
Added to database: 9/26/2025, 1:19:28 PM
Last enriched: 9/26/2025, 1:24:14 PM
Last updated: 10/7/2025, 11:36:49 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11388: Stack-based Buffer Overflow in Tenda AC15
HighSecurity Firm Exposes Role of Beijing Research Institute in China’s Cyber Operations
MediumCVE-2025-11387: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-11386: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-11385: Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.