CVE-2025-60123: CWE-862 Missing Authorization in HivePress HivePress Claim Listings
Missing Authorization vulnerability in HivePress HivePress Claim Listings allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects HivePress Claim Listings: from n/a through 1.1.3.
AI Analysis
Technical Summary
CVE-2025-60123 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the HivePress Claim Listings plugin, versions up to 1.1.3. This vulnerability arises due to improperly configured access control mechanisms within the plugin, allowing users with limited privileges to perform actions or access resources that should be restricted. Specifically, the flaw enables exploitation of incorrectly configured access control security levels, which means that certain operations that require higher authorization levels can be executed by users with lower privileges. The vulnerability has a CVSS 3.1 base score of 4.3, indicating a medium severity level. The vector details (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) reveal that the vulnerability is remotely exploitable over the network, requires low attack complexity, and needs privileges (PR:L) but no user interaction (UI:N). The impact primarily affects integrity (I:L) without compromising confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. HivePress Claim Listings is a WordPress plugin used to manage listing claims on websites, often for directories or marketplaces, which means the vulnerability could allow unauthorized modification or manipulation of listing claims, potentially leading to fraudulent listings or unauthorized content changes.
Potential Impact
For European organizations, especially those operating online marketplaces, directories, or classified listing platforms using HivePress Claim Listings, this vulnerability poses a risk to data integrity. Attackers with low-level privileges could manipulate listing claims, potentially leading to misinformation, fraudulent listings, or unauthorized content changes that could damage brand reputation and user trust. While confidentiality and availability are not directly impacted, the integrity compromise could have downstream effects such as regulatory non-compliance (e.g., GDPR if personal data is involved in listings), customer dissatisfaction, and financial losses due to fraudulent activities. Organizations relying on this plugin should be aware that even low-privilege users might exploit this flaw, increasing the attack surface. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as threat actors often reverse-engineer disclosed vulnerabilities to develop exploits.
Mitigation Recommendations
Organizations should immediately audit their use of the HivePress Claim Listings plugin and restrict user privileges to the minimum necessary, especially for roles that can interact with listing claims. Implement strict role-based access controls (RBAC) and monitor for unusual activities related to listing claims. Since no official patches are currently available, consider temporarily disabling the Claim Listings functionality or the plugin entirely if feasible until a patch is released. Additionally, apply Web Application Firewall (WAF) rules to detect and block suspicious requests targeting listing claim endpoints. Regularly review plugin updates from HivePress and apply security patches promptly once available. Conduct security testing focusing on access control enforcement in the plugin to identify any other potential weaknesses. Finally, maintain comprehensive logging and alerting to detect unauthorized modifications early.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-60123: CWE-862 Missing Authorization in HivePress HivePress Claim Listings
Description
Missing Authorization vulnerability in HivePress HivePress Claim Listings allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects HivePress Claim Listings: from n/a through 1.1.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-60123 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the HivePress Claim Listings plugin, versions up to 1.1.3. This vulnerability arises due to improperly configured access control mechanisms within the plugin, allowing users with limited privileges to perform actions or access resources that should be restricted. Specifically, the flaw enables exploitation of incorrectly configured access control security levels, which means that certain operations that require higher authorization levels can be executed by users with lower privileges. The vulnerability has a CVSS 3.1 base score of 4.3, indicating a medium severity level. The vector details (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) reveal that the vulnerability is remotely exploitable over the network, requires low attack complexity, and needs privileges (PR:L) but no user interaction (UI:N). The impact primarily affects integrity (I:L) without compromising confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. HivePress Claim Listings is a WordPress plugin used to manage listing claims on websites, often for directories or marketplaces, which means the vulnerability could allow unauthorized modification or manipulation of listing claims, potentially leading to fraudulent listings or unauthorized content changes.
Potential Impact
For European organizations, especially those operating online marketplaces, directories, or classified listing platforms using HivePress Claim Listings, this vulnerability poses a risk to data integrity. Attackers with low-level privileges could manipulate listing claims, potentially leading to misinformation, fraudulent listings, or unauthorized content changes that could damage brand reputation and user trust. While confidentiality and availability are not directly impacted, the integrity compromise could have downstream effects such as regulatory non-compliance (e.g., GDPR if personal data is involved in listings), customer dissatisfaction, and financial losses due to fraudulent activities. Organizations relying on this plugin should be aware that even low-privilege users might exploit this flaw, increasing the attack surface. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as threat actors often reverse-engineer disclosed vulnerabilities to develop exploits.
Mitigation Recommendations
Organizations should immediately audit their use of the HivePress Claim Listings plugin and restrict user privileges to the minimum necessary, especially for roles that can interact with listing claims. Implement strict role-based access controls (RBAC) and monitor for unusual activities related to listing claims. Since no official patches are currently available, consider temporarily disabling the Claim Listings functionality or the plugin entirely if feasible until a patch is released. Additionally, apply Web Application Firewall (WAF) rules to detect and block suspicious requests targeting listing claim endpoints. Regularly review plugin updates from HivePress and apply security patches promptly once available. Conduct security testing focusing on access control enforcement in the plugin to identify any other potential weaknesses. Finally, maintain comprehensive logging and alerting to detect unauthorized modifications early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:20:29.870Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d692e0828ba7f61ebe57bc
Added to database: 9/26/2025, 1:19:28 PM
Last enriched: 9/26/2025, 1:24:02 PM
Last updated: 10/7/2025, 2:29:49 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ISC Stormcast For Tuesday, October 7th, 2025 https://isc.sans.edu/podcastdetail/9644, (Tue, Oct 7th)
MediumApple Patches Single Vulnerability CVE-2025-43400, (Mon, Sep 29th)
Medium"user=admin". Sometimes you don't even need to log in., (Tue, Sep 30th)
Medium[Guest Diary] Comparing Honeypot Passwords with HIBP, (Wed, Oct 1st)
MediumMore .well-known Scans, (Thu, Oct 2nd)
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.