Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67584: Missing Authorization in rtCamp GoDAM

0
Medium
VulnerabilityCVE-2025-67584cvecve-2025-67584
Published: Tue Dec 09 2025 (12/09/2025, 14:14:15 UTC)
Source: CVE Database V5
Vendor/Project: rtCamp
Product: GoDAM

Description

Missing Authorization vulnerability in rtCamp GoDAM godam allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GoDAM: from n/a through <= 1.4.6.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:04:30 UTC

Technical Analysis

CVE-2025-67584 identifies a missing authorization vulnerability in rtCamp's GoDAM plugin, a digital asset management tool commonly integrated with WordPress environments. The vulnerability stems from incorrectly configured access control mechanisms that fail to properly verify whether a user is authorized to access certain resources or functionalities within GoDAM. Specifically, versions up to and including 1.4.6 do not enforce adequate authorization checks, allowing unauthenticated remote attackers to access data that should be restricted. The vulnerability is exploitable over the network without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to confidentiality, with no direct effect on data integrity or service availability. Although no known exploits have been reported in the wild, the ease of exploitation and the potential exposure of sensitive digital assets make this a significant concern for organizations relying on GoDAM for managing media and digital content. The absence of published patches necessitates immediate interim risk mitigation strategies. Given GoDAM’s role in managing digital assets, unauthorized access could lead to leakage of proprietary or sensitive media files, potentially impacting organizational confidentiality and compliance requirements.

Potential Impact

For European organizations, the primary impact of CVE-2025-67584 is unauthorized disclosure of digital assets managed via GoDAM. This could include sensitive images, videos, or documents that are critical to business operations or intellectual property. Exposure of such assets may lead to reputational damage, competitive disadvantage, or regulatory non-compliance, especially under GDPR where unauthorized data access is a serious concern. While the vulnerability does not allow modification or deletion of assets, the confidentiality breach alone can have significant consequences. Organizations in sectors such as media, marketing, and e-commerce that rely heavily on digital asset management are particularly at risk. Additionally, the ease of exploitation without authentication increases the likelihood of opportunistic scanning and data harvesting by attackers. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.

Mitigation Recommendations

European organizations should immediately audit their GoDAM installations to determine if they are running affected versions (<=1.4.6). Until an official patch is released, implement strict network-level access controls to restrict access to GoDAM endpoints, such as IP whitelisting or VPN-only access. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized access attempts targeting GoDAM resources. Review and harden WordPress and server configurations to minimize exposure, including disabling directory listings and enforcing HTTPS. Monitor server and application logs for unusual access patterns indicative of exploitation attempts. Engage with rtCamp for timely updates and apply patches promptly once available. Additionally, consider isolating GoDAM instances from critical infrastructure to limit potential lateral movement. Conduct regular security awareness training for administrators managing GoDAM to recognize and respond to suspicious activities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:34.121Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833ad29cea75c35ae5717

Added to database: 12/9/2025, 2:35:25 PM

Last enriched: 1/21/2026, 1:04:30 AM

Last updated: 2/6/2026, 1:25:15 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats