Description
Authorization Bypass Through User-Controlled Key vulnerability in WofficeIO Woffice Core woffice-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Woffice Core: from n/a through <= 5.4.30.
Published: 2026-01-08
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access
Action: Apply Patch
AI Analysis

Impact

Insecure Direct Object References (IDOR) allow an attacker to provide user‑controlled keys and access or alter objects that should be protected. This is an Authorization Bypass classified as CWE‑639. If exploited it can let an attacker view or modify data beyond the intended scope, compromising confidentiality, integrity, or availability of the affected resources.

Affected Systems

WofficeIO’s Woffice Core WordPress plugin is affected. Any release of the plugin version 5.4.30 or earlier is vulnerable, including new installations that have not upgraded past that point.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity, and the EPSS score of < 1 % suggests a relatively low probability of exploitation. Based on the description, it is inferred that the likely attack vector is network‑based, requiring a remote web request that supplies arbitrary identifiers. The plugin is not catalogued in CISA’s KEV, but administrators should monitor for signs of unauthorized access.

Generated by OpenCVE AI on April 28, 2026 at 10:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Woffice Core plugin to a version newer than 5.4.30.
  • Ensure that all user‑controlled keys are validated against proper access controls to prevent IDOR.
  • Implement logging and monitoring of authenticated requests to detect potential misuse of object references.

Generated by OpenCVE AI on April 28, 2026 at 10:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wofficeio
Wofficeio woffice Core
Wordpress
Wordpress wordpress
Vendors & Products Wofficeio
Wofficeio woffice Core
Wordpress
Wordpress wordpress

Thu, 08 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Thu, 08 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in WofficeIO Woffice Core woffice-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Woffice Core: from n/a through <= 5.4.30.
Title WordPress Woffice Core plugin <= 5.4.30 - Insecure Direct Object References (IDOR) vulnerability
Weaknesses CWE-639
References

Subscriptions

Wofficeio Woffice Core
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:23.755Z

Reserved: 2025-12-15T09:59:49.436Z

Link: CVE-2025-67919

cve-icon Vulnrichment

Updated: 2026-01-08T14:55:38.381Z

cve-icon NVD

Status : Deferred

Published: 2026-01-08T10:15:50.840

Modified: 2026-04-27T18:16:48.960

Link: CVE-2025-67919

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T10:15:28Z

Weaknesses