CVE-2025-66087: Missing Authorization in Property Hive PropertyHive
Missing Authorization vulnerability in Property Hive PropertyHive propertyhive allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PropertyHive: from n/a through <= 2.1.12.
AI Analysis
Technical Summary
CVE-2025-66087 identifies a missing authorization vulnerability in the Property Hive plugin, a property management solution widely used in real estate websites. The flaw exists in versions up to and including 2.1.12, where access control mechanisms are incorrectly configured, allowing unauthorized users to access certain resources or functionalities that should be restricted. The vulnerability does not require authentication (PR:N) or user interaction (UI:N) and can be exploited remotely over the network (AV:N). The CVSS 3.1 vector indicates a medium severity with a score of 5.3, primarily impacting confidentiality (C:L) without affecting integrity (I:N) or availability (A:N). This suggests that attackers could gain read-only access to sensitive information but cannot modify or disrupt services. No known public exploits or patches are currently available, emphasizing the need for proactive security reviews. The vulnerability likely stems from missing or misconfigured authorization checks in the plugin’s codebase, which could allow attackers to enumerate or retrieve data such as property listings, user details, or configuration settings. Given Property Hive’s integration with WordPress and its use in real estate platforms, exploitation could lead to privacy breaches and information leakage.
Potential Impact
For European organizations, especially those in the real estate sector using Property Hive, this vulnerability poses a risk of unauthorized data disclosure. Confidential information such as property details, client data, or internal configurations could be exposed, potentially leading to privacy violations and reputational damage. While the vulnerability does not allow data modification or service disruption, the leakage of sensitive information could aid further targeted attacks or fraud. The impact is more pronounced for organizations relying heavily on Property Hive for client management and listings, as unauthorized access could undermine customer trust and regulatory compliance, particularly under GDPR. The absence of known exploits reduces immediate risk, but the ease of exploitation without authentication means attackers could scan for vulnerable installations opportunistically. European real estate markets with high digital adoption may face increased targeting, making timely mitigation critical.
Mitigation Recommendations
Organizations should immediately audit their Property Hive installations to verify access control configurations and ensure that all sensitive endpoints enforce proper authorization checks. Until an official patch is released, consider restricting access to the Property Hive administrative and API endpoints via network-level controls such as IP whitelisting or VPN requirements. Implement web application firewalls (WAF) with custom rules to detect and block unauthorized access attempts targeting Property Hive paths. Regularly monitor logs for unusual access patterns or data retrieval attempts. Engage with the Property Hive vendor or community to track patch releases and apply updates promptly. Additionally, conduct penetration testing focused on access control validation to identify and remediate similar issues proactively. For organizations using WordPress, ensure that the overall platform and plugins are kept up to date and that user roles and permissions are tightly managed to minimize exposure.
Affected Countries
United Kingdom, Germany, France, Netherlands, Spain, Italy
CVE-2025-66087: Missing Authorization in Property Hive PropertyHive
Description
Missing Authorization vulnerability in Property Hive PropertyHive propertyhive allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PropertyHive: from n/a through <= 2.1.12.
AI-Powered Analysis
Technical Analysis
CVE-2025-66087 identifies a missing authorization vulnerability in the Property Hive plugin, a property management solution widely used in real estate websites. The flaw exists in versions up to and including 2.1.12, where access control mechanisms are incorrectly configured, allowing unauthorized users to access certain resources or functionalities that should be restricted. The vulnerability does not require authentication (PR:N) or user interaction (UI:N) and can be exploited remotely over the network (AV:N). The CVSS 3.1 vector indicates a medium severity with a score of 5.3, primarily impacting confidentiality (C:L) without affecting integrity (I:N) or availability (A:N). This suggests that attackers could gain read-only access to sensitive information but cannot modify or disrupt services. No known public exploits or patches are currently available, emphasizing the need for proactive security reviews. The vulnerability likely stems from missing or misconfigured authorization checks in the plugin’s codebase, which could allow attackers to enumerate or retrieve data such as property listings, user details, or configuration settings. Given Property Hive’s integration with WordPress and its use in real estate platforms, exploitation could lead to privacy breaches and information leakage.
Potential Impact
For European organizations, especially those in the real estate sector using Property Hive, this vulnerability poses a risk of unauthorized data disclosure. Confidential information such as property details, client data, or internal configurations could be exposed, potentially leading to privacy violations and reputational damage. While the vulnerability does not allow data modification or service disruption, the leakage of sensitive information could aid further targeted attacks or fraud. The impact is more pronounced for organizations relying heavily on Property Hive for client management and listings, as unauthorized access could undermine customer trust and regulatory compliance, particularly under GDPR. The absence of known exploits reduces immediate risk, but the ease of exploitation without authentication means attackers could scan for vulnerable installations opportunistically. European real estate markets with high digital adoption may face increased targeting, making timely mitigation critical.
Mitigation Recommendations
Organizations should immediately audit their Property Hive installations to verify access control configurations and ensure that all sensitive endpoints enforce proper authorization checks. Until an official patch is released, consider restricting access to the Property Hive administrative and API endpoints via network-level controls such as IP whitelisting or VPN requirements. Implement web application firewalls (WAF) with custom rules to detect and block unauthorized access attempts targeting Property Hive paths. Regularly monitor logs for unusual access patterns or data retrieval attempts. Engage with the Property Hive vendor or community to track patch releases and apply updates promptly. Additionally, conduct penetration testing focused on access control validation to identify and remediate similar issues proactively. For organizations using WordPress, ensure that the overall platform and plugins are kept up to date and that user roles and permissions are tightly managed to minimize exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:21:04.795Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69205c30c36be036e6ff273f
Added to database: 11/21/2025, 12:33:52 PM
Last enriched: 1/21/2026, 12:24:10 AM
Last updated: 2/7/2026, 8:23:48 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighCVE-2026-2074: XML External Entity Reference in O2OA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.