CVE-2025-67560: Missing Authorization in Webilia Inc. Listdom
Missing Authorization vulnerability in Webilia Inc. Listdom listdom allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Listdom: from n/a through <= 5.0.1.
AI Analysis
Technical Summary
CVE-2025-67560 identifies a missing authorization vulnerability in Webilia Inc.'s Listdom software, affecting versions up to and including 5.0.1. The vulnerability arises from incorrectly configured access control security levels, which fail to properly enforce authorization checks on certain operations or resources within the application. This misconfiguration allows an attacker to bypass intended security restrictions, potentially gaining unauthorized access to sensitive functions or data. Although the exact technical details of the flaw are limited, missing authorization typically means that the application does not verify whether a user has the necessary permissions before allowing access to specific features or data. This can lead to unauthorized data disclosure, modification, or other malicious actions. No CVSS score has been assigned yet, and no public exploits are known at this time, indicating the vulnerability is newly disclosed. The issue affects all versions up to 5.0.1, with no specific earliest affected version identified. The vulnerability was published on December 9, 2025, by Patchstack, and remains unpatched as no patch links are currently available. The absence of authentication or user interaction requirements is not explicitly stated, but missing authorization vulnerabilities often require the attacker to have some level of access to the system, such as a valid user session or network access. The vulnerability's impact spans confidentiality, integrity, and potentially availability if unauthorized actions disrupt services. Organizations using Listdom should prioritize assessing their exposure and prepare for patch deployment once available.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized access to sensitive data or administrative functions within Listdom, potentially leading to data breaches, data manipulation, or disruption of services. Given that Listdom is a list management tool, unauthorized access could result in exposure or alteration of critical contact lists, customer data, or internal communications. This can undermine trust, violate data protection regulations such as GDPR, and cause operational disruptions. The impact is heightened in sectors where Listdom is integrated into workflows involving personal data, financial information, or strategic communications. The lack of known exploits currently reduces immediate risk, but the vulnerability's nature means it could be exploited by insiders or external attackers with network access. European organizations must consider the regulatory implications of unauthorized data access and the reputational damage from potential breaches. The vulnerability could also be leveraged as a foothold for further attacks within the network if exploited.
Mitigation Recommendations
1. Monitor Webilia Inc. communications closely for official patches addressing CVE-2025-67560 and apply them promptly upon release. 2. Conduct an immediate audit of Listdom access control configurations to identify and remediate any misconfigurations or overly permissive settings. 3. Implement strict role-based access controls (RBAC) within Listdom to ensure users have only the minimum necessary permissions. 4. Employ network segmentation and firewall rules to restrict access to Listdom instances to trusted users and systems only. 5. Enable detailed logging and monitoring of Listdom access and administrative actions to detect unauthorized attempts or anomalies. 6. Educate administrators and users about the risks of unauthorized access and encourage reporting of suspicious activities. 7. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized access attempts targeting Listdom. 8. Review and enhance overall identity and access management (IAM) policies to reduce the risk of credential compromise that could facilitate exploitation. 9. Prepare incident response plans specific to potential exploitation scenarios involving Listdom to ensure rapid containment and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-67560: Missing Authorization in Webilia Inc. Listdom
Description
Missing Authorization vulnerability in Webilia Inc. Listdom listdom allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Listdom: from n/a through <= 5.0.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-67560 identifies a missing authorization vulnerability in Webilia Inc.'s Listdom software, affecting versions up to and including 5.0.1. The vulnerability arises from incorrectly configured access control security levels, which fail to properly enforce authorization checks on certain operations or resources within the application. This misconfiguration allows an attacker to bypass intended security restrictions, potentially gaining unauthorized access to sensitive functions or data. Although the exact technical details of the flaw are limited, missing authorization typically means that the application does not verify whether a user has the necessary permissions before allowing access to specific features or data. This can lead to unauthorized data disclosure, modification, or other malicious actions. No CVSS score has been assigned yet, and no public exploits are known at this time, indicating the vulnerability is newly disclosed. The issue affects all versions up to 5.0.1, with no specific earliest affected version identified. The vulnerability was published on December 9, 2025, by Patchstack, and remains unpatched as no patch links are currently available. The absence of authentication or user interaction requirements is not explicitly stated, but missing authorization vulnerabilities often require the attacker to have some level of access to the system, such as a valid user session or network access. The vulnerability's impact spans confidentiality, integrity, and potentially availability if unauthorized actions disrupt services. Organizations using Listdom should prioritize assessing their exposure and prepare for patch deployment once available.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized access to sensitive data or administrative functions within Listdom, potentially leading to data breaches, data manipulation, or disruption of services. Given that Listdom is a list management tool, unauthorized access could result in exposure or alteration of critical contact lists, customer data, or internal communications. This can undermine trust, violate data protection regulations such as GDPR, and cause operational disruptions. The impact is heightened in sectors where Listdom is integrated into workflows involving personal data, financial information, or strategic communications. The lack of known exploits currently reduces immediate risk, but the vulnerability's nature means it could be exploited by insiders or external attackers with network access. European organizations must consider the regulatory implications of unauthorized data access and the reputational damage from potential breaches. The vulnerability could also be leveraged as a foothold for further attacks within the network if exploited.
Mitigation Recommendations
1. Monitor Webilia Inc. communications closely for official patches addressing CVE-2025-67560 and apply them promptly upon release. 2. Conduct an immediate audit of Listdom access control configurations to identify and remediate any misconfigurations or overly permissive settings. 3. Implement strict role-based access controls (RBAC) within Listdom to ensure users have only the minimum necessary permissions. 4. Employ network segmentation and firewall rules to restrict access to Listdom instances to trusted users and systems only. 5. Enable detailed logging and monitoring of Listdom access and administrative actions to detect unauthorized attempts or anomalies. 6. Educate administrators and users about the risks of unauthorized access and encourage reporting of suspicious activities. 7. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized access attempts targeting Listdom. 8. Review and enhance overall identity and access management (IAM) policies to reduce the risk of credential compromise that could facilitate exploitation. 9. Prepare incident response plans specific to potential exploitation scenarios involving Listdom to ensure rapid containment and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-09T12:21:23.943Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693833a929cea75c35ae56a6
Added to database: 12/9/2025, 2:35:21 PM
Last enriched: 12/9/2025, 3:09:16 PM
Last updated: 12/10/2025, 11:31:38 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67509: CWE-94: Improper Control of Generation of Code ('Code Injection') in neuron-core neuron-ai
HighCVE-2025-67510: CWE-250: Execution with Unnecessary Privileges in neuron-core neuron-ai
CriticalCVE-2025-67513: CWE-521: Weak Password Requirements in FreePBX security-reporting
MediumCVE-2025-67505: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in okta okta-sdk-java
HighCVE-2025-67490: CWE-863: Incorrect Authorization in auth0 nextjs-auth0
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.