The ONLYOFFICE Docs plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within its oo.callback REST endpoint in versions 1.1.0 to 2.2.0. The plugin’s permission callback only verifies that the supplied, encrypted attachment ID maps to an existing attachment post, but does not verify the requester’s identity or capabilities. This makes it possible for unauthenticated attackers to log in as an arbitrary user.
Metrics
Affected Vendors & Products
References
History
Thu, 24 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 24 Jul 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The ONLYOFFICE Docs plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within its oo.callback REST endpoint in versions 1.1.0 to 2.2.0. The plugin’s permission callback only verifies that the supplied, encrypted attachment ID maps to an existing attachment post, but does not verify the requester’s identity or capabilities. This makes it possible for unauthenticated attackers to log in as an arbitrary user. | |
Title | ONLYOFFICE Docs 1.1.0 - 2.2.0 - Missing Authorization to Unauthenticated Privilege Escalation via callback Function | |
Weaknesses | CWE-862 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-07-24T09:22:17.749Z
Updated: 2025-07-24T13:44:39.011Z
Reserved: 2025-06-19T18:35:39.626Z
Link: CVE-2025-6380

Updated: 2025-07-24T13:44:35.944Z

Status : Awaiting Analysis
Published: 2025-07-24T10:15:26.973
Modified: 2025-07-25T15:29:19.837
Link: CVE-2025-6380

No data.