Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67560: Missing Authorization in Webilia Inc. Listdom

0
Medium
VulnerabilityCVE-2025-67560cvecve-2025-67560
Published: Tue Dec 09 2025 (12/09/2025, 14:14:09 UTC)
Source: CVE Database V5
Vendor/Project: Webilia Inc.
Product: Listdom

Description

Missing Authorization vulnerability in Webilia Inc. Listdom listdom allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Listdom: from n/a through <= 5.0.1.

AI-Powered Analysis

AILast updated: 12/09/2025, 15:09:16 UTC

Technical Analysis

CVE-2025-67560 identifies a missing authorization vulnerability in Webilia Inc.'s Listdom software, affecting versions up to and including 5.0.1. The vulnerability arises from incorrectly configured access control security levels, which fail to properly enforce authorization checks on certain operations or resources within the application. This misconfiguration allows an attacker to bypass intended security restrictions, potentially gaining unauthorized access to sensitive functions or data. Although the exact technical details of the flaw are limited, missing authorization typically means that the application does not verify whether a user has the necessary permissions before allowing access to specific features or data. This can lead to unauthorized data disclosure, modification, or other malicious actions. No CVSS score has been assigned yet, and no public exploits are known at this time, indicating the vulnerability is newly disclosed. The issue affects all versions up to 5.0.1, with no specific earliest affected version identified. The vulnerability was published on December 9, 2025, by Patchstack, and remains unpatched as no patch links are currently available. The absence of authentication or user interaction requirements is not explicitly stated, but missing authorization vulnerabilities often require the attacker to have some level of access to the system, such as a valid user session or network access. The vulnerability's impact spans confidentiality, integrity, and potentially availability if unauthorized actions disrupt services. Organizations using Listdom should prioritize assessing their exposure and prepare for patch deployment once available.

Potential Impact

For European organizations, this vulnerability poses a significant risk of unauthorized access to sensitive data or administrative functions within Listdom, potentially leading to data breaches, data manipulation, or disruption of services. Given that Listdom is a list management tool, unauthorized access could result in exposure or alteration of critical contact lists, customer data, or internal communications. This can undermine trust, violate data protection regulations such as GDPR, and cause operational disruptions. The impact is heightened in sectors where Listdom is integrated into workflows involving personal data, financial information, or strategic communications. The lack of known exploits currently reduces immediate risk, but the vulnerability's nature means it could be exploited by insiders or external attackers with network access. European organizations must consider the regulatory implications of unauthorized data access and the reputational damage from potential breaches. The vulnerability could also be leveraged as a foothold for further attacks within the network if exploited.

Mitigation Recommendations

1. Monitor Webilia Inc. communications closely for official patches addressing CVE-2025-67560 and apply them promptly upon release. 2. Conduct an immediate audit of Listdom access control configurations to identify and remediate any misconfigurations or overly permissive settings. 3. Implement strict role-based access controls (RBAC) within Listdom to ensure users have only the minimum necessary permissions. 4. Employ network segmentation and firewall rules to restrict access to Listdom instances to trusted users and systems only. 5. Enable detailed logging and monitoring of Listdom access and administrative actions to detect unauthorized attempts or anomalies. 6. Educate administrators and users about the risks of unauthorized access and encourage reporting of suspicious activities. 7. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized access attempts targeting Listdom. 8. Review and enhance overall identity and access management (IAM) policies to reduce the risk of credential compromise that could facilitate exploitation. 9. Prepare incident response plans specific to potential exploitation scenarios involving Listdom to ensure rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:23.943Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833a929cea75c35ae56a6

Added to database: 12/9/2025, 2:35:21 PM

Last enriched: 12/9/2025, 3:09:16 PM

Last updated: 12/10/2025, 11:31:38 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats