CVE-2025-6380: CWE-862 Missing Authorization in onlyoffice ONLYOFFICE Docs
The ONLYOFFICE Docs plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within its oo.callback REST endpoint in versions 1.1.0 to 2.2.0. The plugin’s permission callback only verifies that the supplied, encrypted attachment ID maps to an existing attachment post, but does not verify the requester’s identity or capabilities. This makes it possible for unauthenticated attackers to log in as an arbitrary user.
AI Analysis
Technical Summary
CVE-2025-6380 is a critical security vulnerability affecting the ONLYOFFICE Docs plugin for WordPress, specifically versions 1.1.0 through 2.2.0. The vulnerability arises from a missing authorization check in the oo.callback REST endpoint. While the plugin verifies that the encrypted attachment ID corresponds to an existing attachment post, it fails to authenticate or verify the identity and permissions of the requester. This flaw allows unauthenticated attackers to escalate privileges by impersonating arbitrary users without any authentication or user interaction. The vulnerability is classified under CWE-862 (Missing Authorization), indicating a failure to enforce proper access control. The CVSS v3.1 score of 9.8 reflects the critical nature of this issue, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Exploitation could lead to full account takeover, unauthorized data access, and potential system compromise within WordPress environments using the affected ONLYOFFICE Docs plugin versions. No known exploits have been reported in the wild as of the publication date (July 24, 2025), but the severity and ease of exploitation make it a significant threat that demands immediate attention from administrators and security teams.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially those relying on WordPress sites integrated with ONLYOFFICE Docs for document management and collaboration. Successful exploitation could allow attackers to impersonate any user, including administrators, leading to unauthorized access to sensitive corporate documents, confidential client data, and internal communications. This could result in data breaches violating GDPR and other data protection regulations, leading to legal penalties and reputational damage. Additionally, attackers could manipulate or delete critical documents, disrupt business operations, or use compromised accounts as a foothold for further network intrusion. Given the widespread use of WordPress across various sectors in Europe, including government, education, and private enterprises, the potential impact is broad and severe. The vulnerability's network-exploitable nature means attacks could originate remotely without prior access, increasing the threat surface significantly.
Mitigation Recommendations
Immediate mitigation steps include upgrading ONLYOFFICE Docs plugin to a patched version once available, as no patch links are currently provided. Until a patch is released, organizations should consider disabling the ONLYOFFICE Docs plugin or restricting access to the oo.callback REST endpoint via web application firewalls (WAFs) or reverse proxies to limit exposure. Implement strict network segmentation and IP whitelisting to restrict access to WordPress admin and plugin endpoints. Monitoring and logging REST API calls for unusual activity can help detect exploitation attempts. Additionally, enforce strong authentication and authorization policies at the WordPress level, including multi-factor authentication for administrative accounts. Regularly audit user permissions and review plugin usage to minimize unnecessary exposure. Organizations should also prepare incident response plans specific to this vulnerability to quickly contain and remediate any exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-6380: CWE-862 Missing Authorization in onlyoffice ONLYOFFICE Docs
Description
The ONLYOFFICE Docs plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within its oo.callback REST endpoint in versions 1.1.0 to 2.2.0. The plugin’s permission callback only verifies that the supplied, encrypted attachment ID maps to an existing attachment post, but does not verify the requester’s identity or capabilities. This makes it possible for unauthenticated attackers to log in as an arbitrary user.
AI-Powered Analysis
Technical Analysis
CVE-2025-6380 is a critical security vulnerability affecting the ONLYOFFICE Docs plugin for WordPress, specifically versions 1.1.0 through 2.2.0. The vulnerability arises from a missing authorization check in the oo.callback REST endpoint. While the plugin verifies that the encrypted attachment ID corresponds to an existing attachment post, it fails to authenticate or verify the identity and permissions of the requester. This flaw allows unauthenticated attackers to escalate privileges by impersonating arbitrary users without any authentication or user interaction. The vulnerability is classified under CWE-862 (Missing Authorization), indicating a failure to enforce proper access control. The CVSS v3.1 score of 9.8 reflects the critical nature of this issue, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Exploitation could lead to full account takeover, unauthorized data access, and potential system compromise within WordPress environments using the affected ONLYOFFICE Docs plugin versions. No known exploits have been reported in the wild as of the publication date (July 24, 2025), but the severity and ease of exploitation make it a significant threat that demands immediate attention from administrators and security teams.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially those relying on WordPress sites integrated with ONLYOFFICE Docs for document management and collaboration. Successful exploitation could allow attackers to impersonate any user, including administrators, leading to unauthorized access to sensitive corporate documents, confidential client data, and internal communications. This could result in data breaches violating GDPR and other data protection regulations, leading to legal penalties and reputational damage. Additionally, attackers could manipulate or delete critical documents, disrupt business operations, or use compromised accounts as a foothold for further network intrusion. Given the widespread use of WordPress across various sectors in Europe, including government, education, and private enterprises, the potential impact is broad and severe. The vulnerability's network-exploitable nature means attacks could originate remotely without prior access, increasing the threat surface significantly.
Mitigation Recommendations
Immediate mitigation steps include upgrading ONLYOFFICE Docs plugin to a patched version once available, as no patch links are currently provided. Until a patch is released, organizations should consider disabling the ONLYOFFICE Docs plugin or restricting access to the oo.callback REST endpoint via web application firewalls (WAFs) or reverse proxies to limit exposure. Implement strict network segmentation and IP whitelisting to restrict access to WordPress admin and plugin endpoints. Monitoring and logging REST API calls for unusual activity can help detect exploitation attempts. Additionally, enforce strong authentication and authorization policies at the WordPress level, including multi-factor authentication for administrative accounts. Regularly audit user permissions and review plugin usage to minimize unnecessary exposure. Organizations should also prepare incident response plans specific to this vulnerability to quickly contain and remediate any exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-19T18:35:39.626Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6881fdd8ad5a09ad0033bed0
Added to database: 7/24/2025, 9:33:12 AM
Last enriched: 7/24/2025, 9:48:36 AM
Last updated: 8/25/2025, 1:05:00 AM
Views: 15
Related Threats
CVE-2025-58361: CWE-20: Improper Input Validation in MarceloTessaro promptcraft-forge-studio
CriticalCVE-2025-58353: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MarceloTessaro promptcraft-forge-studio
HighCVE-2025-32322: Elevation of privilege in Google Android
HighCVE-2025-22415: Elevation of privilege in Google Android
HighCVE-2025-22414: Elevation of privilege in Google Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.