Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67919: Authorization Bypass Through User-Controlled Key in WofficeIO Woffice Core

0
High
VulnerabilityCVE-2025-67919cvecve-2025-67919
Published: Thu Jan 08 2026 (01/08/2026, 09:17:46 UTC)
Source: CVE Database V5
Vendor/Project: WofficeIO
Product: Woffice Core

Description

Authorization Bypass Through User-Controlled Key vulnerability in WofficeIO Woffice Core woffice-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Woffice Core: from n/a through <= 5.4.30.

AI-Powered Analysis

AILast updated: 01/08/2026, 10:05:03 UTC

Technical Analysis

CVE-2025-67919 identifies a critical authorization bypass vulnerability in the Woffice Core product developed by WofficeIO, affecting versions up to and including 5.4.30. The vulnerability stems from improperly configured access control security levels that rely on user-controlled keys, which attackers can manipulate to circumvent authorization mechanisms. This means that an attacker, potentially with limited privileges or even unauthenticated, could exploit this flaw to gain unauthorized access to restricted areas or functionalities within the Woffice Core platform. Woffice Core is typically used as a collaboration and intranet solution, often deployed in organizational environments to manage internal communications, documents, and workflows. The lack of a CVSS score and absence of known exploits in the wild suggest that the vulnerability is newly disclosed and may not yet be actively exploited. However, the technical nature of the flaw—authorization bypass through user-controlled keys—indicates a fundamental security design issue that could be leveraged to escalate privileges or access sensitive data. The vulnerability was reserved in December 2025 and published in January 2026, indicating recent discovery. No official patches or remediation links are currently provided, emphasizing the need for organizations to proactively assess their Woffice Core configurations and monitor for updates. The absence of CWE identifiers limits detailed classification, but the core issue relates to access control misconfiguration. Given the product's use in enterprise and public sector environments, exploitation could lead to data breaches, unauthorized administrative actions, or disruption of internal services.

Potential Impact

For European organizations, the impact of CVE-2025-67919 could be significant, especially for those relying on Woffice Core for internal collaboration and document management. Unauthorized access could lead to exposure of sensitive corporate or governmental information, manipulation of internal workflows, or unauthorized administrative changes. This could result in data confidentiality breaches, integrity violations, and potential availability disruptions if attackers modify or delete critical data. The vulnerability's nature allows bypassing authorization controls without requiring user interaction or authentication, increasing the risk of widespread exploitation if attackers gain network access. Sectors such as government agencies, educational institutions, and large enterprises using Woffice Core are particularly at risk. The impact extends to compliance risks under GDPR if personal data is exposed. Additionally, the trustworthiness of internal communication platforms could be undermined, affecting operational security and employee confidence.

Mitigation Recommendations

Organizations should immediately audit their Woffice Core deployments to identify any use of user-controlled keys in access control mechanisms. Until official patches are released, administrators should implement strict access control policies, minimizing privileges and restricting key inputs to trusted sources only. Network segmentation and monitoring for unusual access patterns to Woffice Core services can help detect exploitation attempts. Employing Web Application Firewalls (WAFs) with custom rules to block suspicious requests targeting authorization parameters may provide temporary protection. Organizations should subscribe to vendor advisories and Patchstack updates to apply security patches promptly once available. Additionally, conducting penetration testing focused on authorization controls in Woffice Core can help identify and remediate configuration weaknesses. Training IT staff on secure configuration practices and reviewing logs for anomalous activities related to access control bypass attempts are also recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T09:59:49.436Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695f7a5ac901b06321d0bbdf

Added to database: 1/8/2026, 9:35:22 AM

Last enriched: 1/8/2026, 10:05:03 AM

Last updated: 1/10/2026, 10:15:22 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats