Skip to main content

CVE-2025-60130: CWE-862 Missing Authorization in wedos.com WEDOS Global

Medium
VulnerabilityCVE-2025-60130cvecve-2025-60130cwe-862
Published: Fri Sep 26 2025 (09/26/2025, 08:31:42 UTC)
Source: CVE Database V5
Vendor/Project: wedos.com
Product: WEDOS Global

Description

Missing Authorization vulnerability in wedos.com WEDOS Global allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects WEDOS Global: from n/a through 1.2.2.

AI-Powered Analysis

AILast updated: 09/27/2025, 00:11:59 UTC

Technical Analysis

CVE-2025-60130 is a Missing Authorization vulnerability (CWE-862) identified in the WEDOS Global product by wedos.com, affecting versions up to 1.2.2. This vulnerability arises from improper or missing access control checks on certain functionality within the application, allowing unauthorized users to access features or perform actions that should be restricted. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Although it does not impact confidentiality or availability, it compromises integrity by allowing unauthorized modification or manipulation of data or system state. The CVSS base score is 5.3, categorized as medium severity. No public exploits or patches are currently available, and the vulnerability was published recently in September 2025. The lack of proper authorization checks can lead to unauthorized changes that may disrupt business processes or lead to further exploitation if combined with other vulnerabilities.

Potential Impact

For European organizations using WEDOS Global, this vulnerability poses a moderate risk. Unauthorized access to restricted functionality could allow attackers to manipulate configurations, data, or service parameters, potentially leading to operational disruptions or data integrity issues. Given that WEDOS is a Czech-based hosting provider with a significant customer base in Central and Eastern Europe, organizations in these regions are particularly at risk. The impact is heightened for businesses relying on WEDOS Global for critical infrastructure or web hosting services, as unauthorized changes could affect service reliability or compliance with data protection regulations such as GDPR. While the vulnerability does not directly expose confidential data or cause service outages, the integrity compromise could facilitate further attacks or unauthorized data modifications, undermining trust and operational stability.

Mitigation Recommendations

Organizations should immediately audit their use of WEDOS Global services to identify any exposure to this vulnerability. Since no official patches are currently available, it is critical to implement compensating controls such as restricting network access to WEDOS Global management interfaces via IP whitelisting or VPNs, enforcing strong authentication and monitoring for unusual activity. Administrators should review and tighten access control policies within the WEDOS Global environment to ensure that only authorized personnel can access sensitive functions. Additionally, logging and alerting mechanisms should be enhanced to detect unauthorized attempts to access restricted functionality. Organizations should maintain close communication with wedos.com for updates on patches or security advisories and plan for prompt application of fixes once released. Conducting regular security assessments and penetration tests focusing on authorization controls can help identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:20:34.879Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d72b6079aa5c9d0854f44f

Added to database: 9/27/2025, 12:10:08 AM

Last enriched: 9/27/2025, 12:11:59 AM

Last updated: 10/2/2025, 12:11:00 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats