CVE-2025-67566: Missing Authorization in WofficeIO Woffice Core
Missing Authorization vulnerability in WofficeIO Woffice Core woffice-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Woffice Core: from n/a through <= 5.4.30.
AI Analysis
Technical Summary
CVE-2025-67566 identifies a missing authorization vulnerability in WofficeIO's Woffice Core product, specifically affecting versions up to and including 5.4.30. The vulnerability arises from incorrectly configured access control security levels that fail to properly restrict unauthorized access to certain functionalities or data within the application. Because the vulnerability does not require any authentication (PR:N) or user interaction (UI:N), it can be exploited remotely over the network (AV:N) by an unauthenticated attacker. The CVSS v3.1 base score of 5.3 reflects a medium severity, primarily due to its impact on confidentiality (C:L) without affecting integrity or availability (I:N, A:N). This means an attacker could potentially access sensitive information that should be protected but cannot modify or disrupt the system. Woffice Core is a collaborative platform often used for intranet and project management purposes, making the confidentiality breach a concern for organizations relying on it for internal communications and data sharing. No known exploits have been reported in the wild, and no official patches or mitigation links have been published yet. The vulnerability was publicly disclosed on December 9, 2025, by Patchstack. Organizations should prioritize reviewing their Woffice Core access control configurations to ensure proper authorization checks are in place and monitor vendor communications for forthcoming patches.
Potential Impact
For European organizations, the primary impact of CVE-2025-67566 is the potential unauthorized disclosure of sensitive internal information managed through Woffice Core. This could include confidential project data, employee information, or strategic documents, leading to privacy violations, competitive disadvantage, or regulatory non-compliance under GDPR. While the vulnerability does not allow data modification or service disruption, the confidentiality breach alone can have significant reputational and operational consequences. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that use Woffice Core for internal collaboration are at higher risk. The ease of exploitation without authentication increases the threat level, especially for externally accessible instances. However, the absence of known active exploits and the medium severity score suggest the threat is moderate but should not be ignored. Failure to address this vulnerability could invite targeted reconnaissance or data harvesting attempts by threat actors focusing on European entities.
Mitigation Recommendations
European organizations should immediately audit their Woffice Core deployments to identify publicly accessible instances and verify access control configurations. Specific mitigation steps include: 1) Reviewing and tightening role-based access controls and permission settings within Woffice Core to ensure no unauthorized access paths exist; 2) Restricting network exposure by limiting access to Woffice Core instances via VPNs or IP whitelisting; 3) Monitoring logs for unusual access patterns or unauthorized data retrieval attempts; 4) Applying vendor patches promptly once released, as no official patch is currently available; 5) Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting access control weaknesses; 6) Educating administrators on secure configuration best practices for Woffice Core; 7) Conducting penetration testing focused on authorization bypass scenarios to validate remediation effectiveness. These measures go beyond generic advice by focusing on configuration hardening, network segmentation, and proactive detection tailored to this vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-67566: Missing Authorization in WofficeIO Woffice Core
Description
Missing Authorization vulnerability in WofficeIO Woffice Core woffice-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Woffice Core: from n/a through <= 5.4.30.
AI-Powered Analysis
Technical Analysis
CVE-2025-67566 identifies a missing authorization vulnerability in WofficeIO's Woffice Core product, specifically affecting versions up to and including 5.4.30. The vulnerability arises from incorrectly configured access control security levels that fail to properly restrict unauthorized access to certain functionalities or data within the application. Because the vulnerability does not require any authentication (PR:N) or user interaction (UI:N), it can be exploited remotely over the network (AV:N) by an unauthenticated attacker. The CVSS v3.1 base score of 5.3 reflects a medium severity, primarily due to its impact on confidentiality (C:L) without affecting integrity or availability (I:N, A:N). This means an attacker could potentially access sensitive information that should be protected but cannot modify or disrupt the system. Woffice Core is a collaborative platform often used for intranet and project management purposes, making the confidentiality breach a concern for organizations relying on it for internal communications and data sharing. No known exploits have been reported in the wild, and no official patches or mitigation links have been published yet. The vulnerability was publicly disclosed on December 9, 2025, by Patchstack. Organizations should prioritize reviewing their Woffice Core access control configurations to ensure proper authorization checks are in place and monitor vendor communications for forthcoming patches.
Potential Impact
For European organizations, the primary impact of CVE-2025-67566 is the potential unauthorized disclosure of sensitive internal information managed through Woffice Core. This could include confidential project data, employee information, or strategic documents, leading to privacy violations, competitive disadvantage, or regulatory non-compliance under GDPR. While the vulnerability does not allow data modification or service disruption, the confidentiality breach alone can have significant reputational and operational consequences. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that use Woffice Core for internal collaboration are at higher risk. The ease of exploitation without authentication increases the threat level, especially for externally accessible instances. However, the absence of known active exploits and the medium severity score suggest the threat is moderate but should not be ignored. Failure to address this vulnerability could invite targeted reconnaissance or data harvesting attempts by threat actors focusing on European entities.
Mitigation Recommendations
European organizations should immediately audit their Woffice Core deployments to identify publicly accessible instances and verify access control configurations. Specific mitigation steps include: 1) Reviewing and tightening role-based access controls and permission settings within Woffice Core to ensure no unauthorized access paths exist; 2) Restricting network exposure by limiting access to Woffice Core instances via VPNs or IP whitelisting; 3) Monitoring logs for unusual access patterns or unauthorized data retrieval attempts; 4) Applying vendor patches promptly once released, as no official patch is currently available; 5) Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting access control weaknesses; 6) Educating administrators on secure configuration best practices for Woffice Core; 7) Conducting penetration testing focused on authorization bypass scenarios to validate remediation effectiveness. These measures go beyond generic advice by focusing on configuration hardening, network segmentation, and proactive detection tailored to this vulnerability's characteristics.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-09T12:21:28.862Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693833ab29cea75c35ae56d1
Added to database: 12/9/2025, 2:35:23 PM
Last enriched: 1/21/2026, 1:00:07 AM
Last updated: 2/7/2026, 9:06:34 AM
Views: 79
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumCVE-2026-1613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mrlister1 Wonka Slide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.