Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-6380 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical auth bypass in ONLYOFFICE Docs plugin for WordPress. πŸ“‰ **Consequences**: Attackers can log in as *any* user without credentials. Total loss of confidentiality, integrity, and availability.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-862** (Missing Authorization). The plugin fails to verify if the user has permission to access specific resources or actions. 🚫 No checks = No protection.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin **ONLYOFFICE Docs**. πŸ“ **Versions**: **1.1.0** through **2.2.0**. 🏒 **Vendor**: Onlyoffice. If you use these versions, you are at risk!

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: βœ… **Privileges**: Arbitrary user login (Admin/User). βœ… **Data**: Full access to sensitive docs. βœ… **Impact**: High (CVSS H/H/H). They can read, modify, or delete anything.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Exploitation Threshold**: **LOW**. 🌐 **Network**: Remote (AV:N). πŸ”‘ **Auth**: None required (PR:N). πŸ–±οΈ **UI**: None required (UI:N). 🎯 **Complexity**: Low (AC:L). Easy to exploit!

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ•΅οΈ **Public Exploit**: **No PoC provided** in the data. πŸ“° **References**: WordFence and WordPress Trac links exist. ⚠️ **Risk**: Even without a public script, the flaw is simple. Wild exploitation is likely imminent.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check WordPress Plugins list. 2. Look for **ONLYOFFICE Docs**. 3. Verify version is **≀ 2.2.0**. 4. Scan for the callback endpoint `/public/class-onlyoffice-plugin-public.php`.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **Yes**. πŸ“… **Published**: 2025-07-24. πŸ”„ **Action**: Update to the latest version via WordPress Dashboard. πŸ“ **Source**: WordPress Plugin Trac confirms the fix path.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. **Disable** the plugin immediately. 2. **Remove** ONLYOFFICE Docs from the site. 3. Use alternative document editors. πŸ›‘ Do not leave it active without a fix!

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: **P1**. CVSS is High impact. Remote, unauthenticated access. Patch **NOW** or disable the plugin. Do not wait!