Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66430: n/a

0
Critical
VulnerabilityCVE-2025-66430cvecve-2025-66430
Published: Fri Dec 12 2025 (12/12/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Plesk 18.0 has Incorrect Access Control.

AI-Powered Analysis

AILast updated: 12/12/2025, 16:03:17 UTC

Technical Analysis

CVE-2025-66430 identifies an incorrect access control vulnerability in Plesk version 18.0. Access control vulnerabilities occur when a system fails to properly restrict user permissions, allowing unauthorized users to perform actions or access data beyond their privileges. Plesk is a widely used web hosting control panel that enables administrators and users to manage websites, mail servers, and other hosting services. The vulnerability implies that certain access control checks within Plesk 18.0 are insufficient or improperly implemented, potentially permitting unauthorized access to sensitive management functions or data. The lack of detailed affected versions and technical specifics limits precise analysis, but the core issue is a failure in enforcing access restrictions. No known exploits have been reported, and no patches or fixes are currently linked, indicating this may be a recently disclosed or reserved CVE. The absence of a CVSS score suggests that the vulnerability has not yet been fully assessed for impact or exploitability. However, incorrect access control issues generally pose significant risks as they can lead to unauthorized data disclosure, modification, or administrative control takeover. Organizations using Plesk 18.0 should prioritize monitoring and prepare for prompt patching once updates become available.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, particularly for web hosting providers, managed service providers, and enterprises relying on Plesk for server and website management. Unauthorized access could lead to exposure or modification of sensitive customer data, disruption of hosted services, or unauthorized administrative actions that compromise server integrity. This could result in data breaches, service outages, reputational damage, and regulatory non-compliance under GDPR. The risk is heightened in environments where Plesk is used to manage multiple client websites or critical infrastructure. Since no exploits are currently known, the immediate risk is moderate, but the potential for future exploitation remains. Organizations with large-scale Plesk deployments in Europe should consider this vulnerability a significant threat vector that could affect confidentiality, integrity, and availability of hosted services.

Mitigation Recommendations

1. Monitor official Plesk security advisories and apply patches or updates promptly once released for this vulnerability. 2. Conduct a thorough review of user roles, permissions, and access controls within Plesk to ensure the principle of least privilege is enforced. 3. Implement enhanced logging and monitoring of access to Plesk management interfaces to detect unusual or unauthorized activities early. 4. Restrict access to Plesk interfaces via network controls such as VPNs, IP whitelisting, or firewall rules to limit exposure. 5. Consider temporary compensating controls such as disabling non-essential features or interfaces until a patch is available. 6. Educate administrators and users about the risks of unauthorized access and encourage strong authentication mechanisms, including multi-factor authentication where possible. 7. Regularly audit Plesk configurations and access logs to identify and remediate potential misuse or misconfigurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-30T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c3957dc37602712b0d798

Added to database: 12/12/2025, 3:48:39 PM

Last enriched: 12/12/2025, 4:03:17 PM

Last updated: 12/13/2025, 4:26:45 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats