Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68588: Missing Authorization in totalsoft TS Poll

0
High
VulnerabilityCVE-2025-68588cvecve-2025-68588
Published: Wed Dec 24 2025 (12/24/2025, 13:10:42 UTC)
Source: CVE Database V5
Vendor/Project: totalsoft
Product: TS Poll

Description

Missing Authorization vulnerability in totalsoft TS Poll poll-wp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TS Poll: from n/a through <= 2.5.3.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:37:45 UTC

Technical Analysis

CVE-2025-68588 identifies a missing authorization vulnerability in totalsoft's TS Poll application, specifically affecting versions up to 2.5.3. The vulnerability stems from incorrectly configured access control security levels, which fail to properly restrict user permissions. This misconfiguration allows an attacker with low privileges (PR:L) to remotely exploit the system over a network (AV:N) without requiring user interaction (UI:N). The vulnerability impacts the confidentiality and integrity of the system (C:H/I:H), but does not affect availability (A:N). TS Poll is a polling and survey management tool used by organizations to collect and analyze data. The missing authorization means unauthorized users can access or manipulate sensitive poll data or configurations, potentially leading to data breaches, misinformation, or unauthorized changes to polling results. The vulnerability was reserved on December 19, 2025, and published on December 24, 2025. No patches or known exploits are currently available, but the high CVSS score (8.1) reflects the serious risk posed by this flaw. The vulnerability requires only low privileges to exploit and can be triggered remotely, increasing its risk profile. Organizations using TS Poll should urgently review their access control policies and monitor for suspicious activity until a patch is released.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of polling data, which may be critical for decision-making, customer feedback, or internal assessments. Unauthorized access could lead to data leakage, manipulation of poll results, or exposure of sensitive information, undermining trust and potentially causing reputational damage. Since TS Poll is used in various sectors including public administration, market research, and corporate environments, the impact could extend to political polling, regulatory compliance surveys, and business intelligence. The lack of availability impact means systems remain operational, but compromised data integrity could have cascading effects on business processes and decision accuracy. The remote exploitability and low privilege requirement make it easier for attackers to leverage this vulnerability, increasing the likelihood of targeted attacks or opportunistic exploitation. European organizations with strict data protection regulations like GDPR face additional legal and compliance risks if sensitive personal data is exposed due to this vulnerability.

Mitigation Recommendations

1. Immediately conduct a thorough audit of TS Poll access control configurations to identify and correct any misconfigurations or overly permissive settings. 2. Implement network segmentation to restrict TS Poll access only to trusted internal users and systems, minimizing exposure to external threats. 3. Enforce the principle of least privilege for all TS Poll user accounts, ensuring users have only the minimum necessary permissions. 4. Monitor logs and network traffic for unusual access patterns or unauthorized attempts to access TS Poll resources. 5. Engage with totalsoft support or vendor channels to obtain patches or updates as soon as they become available and apply them promptly. 6. Consider deploying web application firewalls (WAF) with custom rules to detect and block suspicious requests targeting TS Poll endpoints. 7. Educate administrators and users about the risks of unauthorized access and encourage reporting of anomalies. 8. If possible, temporarily disable or restrict TS Poll functionality until a patch is applied to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-19T10:17:41.811Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694bea23279c98bf57f752be

Added to database: 12/24/2025, 1:26:59 PM

Last enriched: 1/21/2026, 1:37:45 AM

Last updated: 2/7/2026, 4:00:02 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats