VYPR
Medium severity4.3NVD Advisory· Published Sep 26, 2025· Updated Apr 23, 2026

CVE-2025-60122

CVE-2025-60122

Description

Missing Authorization vulnerability in HivePress HivePress Claim Listings hivepress-claim-listings allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects HivePress Claim Listings: from n/a through <= 1.1.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in HivePress Claim Listings ≤1.1.4 allows unprivileged users to exploit incorrectly configured access controls.

Vulnerability

Overview

The HivePress Claim Listings plugin for WordPress versions up to and including 1.1.4 suffers from a missing authorization vulnerability. The plugin fails to properly enforce access control checks, allowing users with lower privileges to perform actions that should require higher-level permissions. This is a classic broken access control issue where the software does not verify that the requesting user has the necessary capabilities before executing sensitive functions [1].

Exploitation

An attacker can exploit this vulnerability without needing any special authentication beyond a standard user account. The missing authorization check means that any authenticated user can potentially access and manipulate claim listings functionality that should be restricted to administrators or require administrative privileges. The attack surface is broad because the plugin is widely used on WordPress sites, and the vulnerability is present in all versions from n/a through 1.1.4 [1].

Impact

Successful exploitation allows an attacker to bypass intended access control security levels. This could lead to unauthorized modification or deletion of claim listings, or other actions that compromise the integrity of the plugin's data. The vulnerability is rated as Medium severity with a CVSS v3 score of 4.3, reflecting the need for authentication but the potential for significant impact on the affected site's functionality [1].

Mitigation

The vendor has not released a patched version beyond 1.1.4, so users should update to the latest available version. If an update is not possible, immediate action is recommended by disabling the plugin or implementing additional access control measures via a web application firewall or custom code. The vulnerability is known to be used in mass-exploit campaigns, making timely mitigation critical [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.