VYPR
Medium severity5.3NVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2025-67584

CVE-2025-67584

Description

Missing Authorization vulnerability in rtCamp GoDAM godam allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GoDAM: from n/a through <= 1.4.6.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in WordPress GoDAM plugin (<=1.4.6) allows unauthenticated access control bypass, enabling mass exploitation.

The WordPress GoDAM plugin by rtCamp suffers from a missing authorization vulnerability (CVE-2025-67584) affecting versions up to and including 1.4.6. This flaw allows an attacker to bypass access control mechanisms, as the plugin does not properly enforce permissions on certain functions [1].

Exploitation does not require authentication, making it accessible to any unauthenticated user who can send crafted requests to the WordPress site. The vulnerability is commonly used in mass-exploit campaigns, allowing attackers to target thousands of websites simultaneously regardless of traffic or popularity [1].

An attacker exploiting this issue can gain unauthorized access to privileged actions or data that should be restricted to higher-level users. This could lead to data leakage, modification, or further compromise of the WordPress installation [1].

The vulnerability has been patched in version 1.4.7. Users are strongly advised to update the plugin immediately. If updating is not possible, it is recommended to seek assistance from a hosting provider or web developer. The Patchstack auto-update feature can also be enabled for vulnerable plugins [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.