CVE-2025-67919: Authorization Bypass Through User-Controlled Key in WofficeIO Woffice Core
Authorization Bypass Through User-Controlled Key vulnerability in WofficeIO Woffice Core woffice-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Woffice Core: from n/a through <= 5.4.30.
AI Analysis
Technical Summary
CVE-2025-67919 identifies an authorization bypass vulnerability in WofficeIO's Woffice Core, a collaboration and intranet WordPress theme widely used for enterprise and organizational portals. The vulnerability arises from incorrectly configured access control security levels that allow an attacker to manipulate a user-controlled key parameter to bypass authorization checks. This flaw affects all versions up to and including 5.4.30. The vulnerability is exploitable remotely over the network with low privileges and requires no user interaction, making it relatively easy to exploit. Successful exploitation grants an attacker unauthorized access to sensitive information and privileged functions, compromising confidentiality and integrity of the system. The CVSS v3.1 score of 8.1 reflects the high impact on confidentiality and integrity, combined with low attack complexity and no user interaction. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the widespread use of Woffice Core in European organizations for internal collaboration and knowledge management. The lack of available patches at the time of publication necessitates immediate mitigation efforts focused on access control review and input validation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive internal data, manipulation of critical collaboration workflows, and potential exposure of confidential business information. Given Woffice Core's use in sectors such as education, government, and corporate intranets, exploitation could disrupt internal operations and erode trust in organizational security. The bypass of authorization controls undermines the integrity of access policies, potentially allowing attackers to escalate privileges or access restricted resources. Although availability is not impacted, the confidentiality and integrity breaches could result in regulatory non-compliance, reputational damage, and financial losses. Organizations relying on Woffice Core should consider the risk elevated, especially those with sensitive or regulated data subject to GDPR and other European data protection laws.
Mitigation Recommendations
1. Monitor WofficeIO official channels for patches addressing CVE-2025-67919 and apply them immediately upon release. 2. Conduct a thorough audit of access control configurations within Woffice Core to identify and correct any misconfigurations, ensuring that user-controlled keys cannot influence authorization decisions. 3. Implement strict input validation and sanitization on all user-supplied parameters, particularly those controlling access levels or keys. 4. Restrict network access to Woffice Core administrative interfaces to trusted IP ranges and enforce multi-factor authentication for privileged accounts. 5. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to manipulate authorization keys or bypass access controls. 6. Regularly review logs for suspicious access patterns indicative of exploitation attempts. 7. Educate administrators and developers on secure access control practices to prevent similar vulnerabilities in future deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-67919: Authorization Bypass Through User-Controlled Key in WofficeIO Woffice Core
Description
Authorization Bypass Through User-Controlled Key vulnerability in WofficeIO Woffice Core woffice-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Woffice Core: from n/a through <= 5.4.30.
AI-Powered Analysis
Technical Analysis
CVE-2025-67919 identifies an authorization bypass vulnerability in WofficeIO's Woffice Core, a collaboration and intranet WordPress theme widely used for enterprise and organizational portals. The vulnerability arises from incorrectly configured access control security levels that allow an attacker to manipulate a user-controlled key parameter to bypass authorization checks. This flaw affects all versions up to and including 5.4.30. The vulnerability is exploitable remotely over the network with low privileges and requires no user interaction, making it relatively easy to exploit. Successful exploitation grants an attacker unauthorized access to sensitive information and privileged functions, compromising confidentiality and integrity of the system. The CVSS v3.1 score of 8.1 reflects the high impact on confidentiality and integrity, combined with low attack complexity and no user interaction. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the widespread use of Woffice Core in European organizations for internal collaboration and knowledge management. The lack of available patches at the time of publication necessitates immediate mitigation efforts focused on access control review and input validation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive internal data, manipulation of critical collaboration workflows, and potential exposure of confidential business information. Given Woffice Core's use in sectors such as education, government, and corporate intranets, exploitation could disrupt internal operations and erode trust in organizational security. The bypass of authorization controls undermines the integrity of access policies, potentially allowing attackers to escalate privileges or access restricted resources. Although availability is not impacted, the confidentiality and integrity breaches could result in regulatory non-compliance, reputational damage, and financial losses. Organizations relying on Woffice Core should consider the risk elevated, especially those with sensitive or regulated data subject to GDPR and other European data protection laws.
Mitigation Recommendations
1. Monitor WofficeIO official channels for patches addressing CVE-2025-67919 and apply them immediately upon release. 2. Conduct a thorough audit of access control configurations within Woffice Core to identify and correct any misconfigurations, ensuring that user-controlled keys cannot influence authorization decisions. 3. Implement strict input validation and sanitization on all user-supplied parameters, particularly those controlling access levels or keys. 4. Restrict network access to Woffice Core administrative interfaces to trusted IP ranges and enforce multi-factor authentication for privileged accounts. 5. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to manipulate authorization keys or bypass access controls. 6. Regularly review logs for suspicious access patterns indicative of exploitation attempts. 7. Educate administrators and developers on secure access control practices to prevent similar vulnerabilities in future deployments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-15T09:59:49.436Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695f7a5ac901b06321d0bbdf
Added to database: 1/8/2026, 9:35:22 AM
Last enriched: 1/22/2026, 9:07:42 PM
Last updated: 2/7/2026, 2:29:39 PM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.