Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63063: Missing Authorization in Yandex Metrika Yandex.Metrica

0
Medium
VulnerabilityCVE-2025-63063cvecve-2025-63063
Published: Tue Dec 09 2025 (12/09/2025, 14:52:34 UTC)
Source: CVE Database V5
Vendor/Project: Yandex Metrika
Product: Yandex.Metrica

Description

Missing Authorization vulnerability in Yandex Metrika Yandex.Metrica wp-yandex-metrika allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Yandex.Metrica: from n/a through <= 1.2.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 06:57:00 UTC

Technical Analysis

CVE-2025-63063 is a Missing Authorization vulnerability identified in the Yandex Metrika WordPress plugin (Yandex.Metrica) affecting versions up to and including 1.2.2. The vulnerability arises from incorrectly configured access control mechanisms within the plugin, allowing attackers with low privileges (PR:L) to bypass authorization checks and access sensitive data or functionality that should be restricted. The attack vector is network-based (AV:N), requiring no user interaction (UI:N), and the scope remains unchanged (S:U). The vulnerability primarily impacts confidentiality (C:H) without affecting integrity or availability. This suggests that unauthorized users could access sensitive analytics data collected by Yandex Metrika, potentially exposing user behavior, traffic statistics, or other private information. Although no public exploits have been reported yet, the medium CVSS score of 6.5 indicates a significant risk if exploited. The plugin is widely used for website analytics, and improper access control could lead to data leakage or privacy violations. The vulnerability was reserved in late October 2025 and published in December 2025, with no patch links currently available, indicating that remediation may still be pending or in progress. Organizations relying on Yandex Metrika for web analytics should be aware of this flaw and prepare to apply updates or mitigations promptly.

Potential Impact

For European organizations, the primary impact of CVE-2025-63063 is the potential unauthorized disclosure of sensitive web analytics data collected by Yandex Metrika. This data may include detailed visitor statistics, user behavior patterns, and other metadata that could be leveraged for further attacks or competitive intelligence. Exposure of such data can lead to privacy compliance issues under GDPR, reputational damage, and loss of customer trust. Since the vulnerability does not affect data integrity or availability, direct disruption of services is unlikely. However, the confidentiality breach itself can have serious consequences, especially for organizations handling sensitive or regulated information. Attackers exploiting this vulnerability could gain insights into website traffic and user interactions, which may facilitate targeted phishing or social engineering campaigns. The medium severity rating suggests that while the risk is not critical, it is substantial enough to warrant immediate attention, particularly for sectors with high privacy requirements such as finance, healthcare, and government within Europe.

Mitigation Recommendations

1. Monitor official Yandex Metrika and WordPress plugin repositories for security updates and apply patches immediately once available. 2. Until a patch is released, restrict access to the Yandex Metrika plugin’s administrative interfaces by IP whitelisting or VPN access to limit exposure. 3. Implement strict role-based access controls within WordPress to ensure only trusted users have permissions related to the Yandex Metrika plugin. 4. Conduct regular audits of plugin configurations and access logs to detect any unauthorized access attempts. 5. Consider temporarily disabling the Yandex Metrika plugin if analytics data confidentiality is critical and no immediate patch is available. 6. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin endpoints. 7. Educate administrators about the risks of missing authorization vulnerabilities and encourage prompt reporting of anomalies. These targeted measures go beyond generic advice by focusing on access restriction, monitoring, and proactive patch management tailored to this specific plugin vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:26:38.886Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69383acd29cea75c35b76ff8

Added to database: 12/9/2025, 3:05:49 PM

Last enriched: 2/12/2026, 6:57:00 AM

Last updated: 3/24/2026, 8:01:37 PM

Views: 191

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses