Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67919: Authorization Bypass Through User-Controlled Key in WofficeIO Woffice Core

0
High
VulnerabilityCVE-2025-67919cvecve-2025-67919
Published: Thu Jan 08 2026 (01/08/2026, 09:17:46 UTC)
Source: CVE Database V5
Vendor/Project: WofficeIO
Product: Woffice Core

Description

Authorization Bypass Through User-Controlled Key vulnerability in WofficeIO Woffice Core woffice-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Woffice Core: from n/a through <= 5.4.30.

AI-Powered Analysis

AILast updated: 01/22/2026, 21:07:42 UTC

Technical Analysis

CVE-2025-67919 identifies an authorization bypass vulnerability in WofficeIO's Woffice Core, a collaboration and intranet WordPress theme widely used for enterprise and organizational portals. The vulnerability arises from incorrectly configured access control security levels that allow an attacker to manipulate a user-controlled key parameter to bypass authorization checks. This flaw affects all versions up to and including 5.4.30. The vulnerability is exploitable remotely over the network with low privileges and requires no user interaction, making it relatively easy to exploit. Successful exploitation grants an attacker unauthorized access to sensitive information and privileged functions, compromising confidentiality and integrity of the system. The CVSS v3.1 score of 8.1 reflects the high impact on confidentiality and integrity, combined with low attack complexity and no user interaction. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the widespread use of Woffice Core in European organizations for internal collaboration and knowledge management. The lack of available patches at the time of publication necessitates immediate mitigation efforts focused on access control review and input validation.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive internal data, manipulation of critical collaboration workflows, and potential exposure of confidential business information. Given Woffice Core's use in sectors such as education, government, and corporate intranets, exploitation could disrupt internal operations and erode trust in organizational security. The bypass of authorization controls undermines the integrity of access policies, potentially allowing attackers to escalate privileges or access restricted resources. Although availability is not impacted, the confidentiality and integrity breaches could result in regulatory non-compliance, reputational damage, and financial losses. Organizations relying on Woffice Core should consider the risk elevated, especially those with sensitive or regulated data subject to GDPR and other European data protection laws.

Mitigation Recommendations

1. Monitor WofficeIO official channels for patches addressing CVE-2025-67919 and apply them immediately upon release. 2. Conduct a thorough audit of access control configurations within Woffice Core to identify and correct any misconfigurations, ensuring that user-controlled keys cannot influence authorization decisions. 3. Implement strict input validation and sanitization on all user-supplied parameters, particularly those controlling access levels or keys. 4. Restrict network access to Woffice Core administrative interfaces to trusted IP ranges and enforce multi-factor authentication for privileged accounts. 5. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to manipulate authorization keys or bypass access controls. 6. Regularly review logs for suspicious access patterns indicative of exploitation attempts. 7. Educate administrators and developers on secure access control practices to prevent similar vulnerabilities in future deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T09:59:49.436Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695f7a5ac901b06321d0bbdf

Added to database: 1/8/2026, 9:35:22 AM

Last enriched: 1/22/2026, 9:07:42 PM

Last updated: 2/5/2026, 4:10:48 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats