Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60122: CWE-862 Missing Authorization in HivePress HivePress Claim Listings

0
Medium
VulnerabilityCVE-2025-60122cvecve-2025-60122cwe-862
Published: Fri Sep 26 2025 (09/26/2025, 08:31:37 UTC)
Source: CVE Database V5
Vendor/Project: HivePress
Product: HivePress Claim Listings

Description

Missing Authorization vulnerability in HivePress HivePress Claim Listings allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects HivePress Claim Listings: from n/a through 1.1.3.

AI-Powered Analysis

AILast updated: 09/26/2025, 13:24:14 UTC

Technical Analysis

CVE-2025-60122 is a Missing Authorization vulnerability (CWE-862) identified in the HivePress Claim Listings plugin, affecting versions up to 1.1.3. This vulnerability arises from improperly configured access control mechanisms within the plugin, allowing users with limited privileges (requiring at least some level of authentication) to perform actions or access resources beyond their authorization scope. Specifically, the flaw permits privilege escalation or unauthorized modification of listing claims without proper verification of user permissions. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and needs privileges (PR:L) but does not require user interaction (UI:N). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. The impact affects integrity (I:L) but not confidentiality or availability, indicating attackers can alter data or listings but cannot read sensitive information or cause denial of service. The CVSS v3.1 base score is 4.3, categorizing it as a medium severity issue. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could be leveraged by authenticated users to manipulate listing claims, potentially leading to fraudulent listings or unauthorized content modifications within websites using HivePress Claim Listings, which is a WordPress plugin commonly used for directory and listing management.

Potential Impact

For European organizations, especially those operating online marketplaces, directories, or classified listing platforms using HivePress Claim Listings, this vulnerability poses a risk of unauthorized data manipulation. Attackers with low-level authenticated access could alter listing claims, potentially damaging the integrity of business-critical data, misleading customers, or facilitating fraud. This could result in reputational damage, loss of customer trust, and potential regulatory scrutiny under GDPR if manipulated data leads to privacy or consumer protection issues. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact could disrupt business operations and lead to financial losses. Organizations relying on HivePress for managing user-generated content should be aware that attackers might exploit this flaw to escalate privileges within the application, affecting the reliability of their listings and associated services.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement compensating controls immediately. These include: 1) Restricting user roles and permissions tightly within WordPress to minimize the number of users with claim listing privileges; 2) Monitoring and logging all claim listing modifications to detect suspicious activities promptly; 3) Applying web application firewall (WAF) rules to detect and block anomalous requests targeting claim listing endpoints; 4) Conducting regular audits of listing claims to identify unauthorized changes; 5) Temporarily disabling the Claim Listings feature if feasible until a patch is available; 6) Keeping WordPress core and all plugins updated to the latest versions to reduce attack surface; 7) Educating administrators and users about the risk and encouraging strong authentication practices to prevent unauthorized access. Once a patch is released, prioritize immediate deployment to remediate the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:20:29.870Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d692e0828ba7f61ebe57b9

Added to database: 9/26/2025, 1:19:28 PM

Last enriched: 9/26/2025, 1:24:14 PM

Last updated: 10/7/2025, 11:36:49 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats