{"id":59742,"date":"2025-07-30T01:59:48","date_gmt":"2025-07-30T01:59:48","guid":{"rendered":""},"modified":"2025-08-09T05:56:49","modified_gmt":"2025-08-09T11:56:49","slug":"cve-2025-6380-privilege-escalation-vulnerability-in-onlyoffice-docs-plugin-for-wordpress","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-6380-privilege-escalation-vulnerability-in-onlyoffice-docs-plugin-for-wordpress\/","title":{"rendered":"<strong>CVE-2025-6380: Privilege Escalation Vulnerability in ONLYOFFICE Docs Plugin for WordPress<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The cybersecurity landscape faces a new threat in the form of a severe vulnerability in the ONLYOFFICE Docs plugin for WordPress. The vulnerability, identified as CVE-2025-6380, potentially affects a vast number of websites using the ONLYOFFICE Docs plugin, ranging from versions 1.1.0 to 2.2.0. The severity of this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-46835-high-risk-vulnerability-in-git-gui-allows-unauthorized-file-overwrite\/\"  data-wpil-monitor-id=\"66834\">vulnerability lies in the fact that it allows<\/a> unauthenticated attackers to perform privilege escalation, potentially leading to system compromise and data leakage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-6380<br \/>\nSeverity: Critical (9.8 out of 10)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-31278-memory-corruption-vulnerability-with-potential-system-compromise\/\"  data-wpil-monitor-id=\"70699\">Potential system<\/a> compromise and data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1398522153\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>ONLYOFFICE Docs <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5835-droip-plugin-for-wordpress-unauthorized-access-and-modification-vulnerability\/\"  data-wpil-monitor-id=\"68973\">Plugin for WordPress<\/a> | 1.1.0 &#8211; 2.2.0<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The vulnerability arises from a lack of proper authorization in the oo.callback REST endpoint of the ONLYOFFICE <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7401-critical-file-read-write-vulnerability-in-premium-age-verification-restriction-for-wordpress-plugin\/\"  data-wpil-monitor-id=\"66530\">Docs plugin<\/a> for WordPress. The plugin&#8217;s permission callback checks that the supplied, encrypted attachment ID maps to an existing attachment post. However, it does not verify the identity or capabilities of the requester. This oversight allows unauthenticated attackers to log in as any user, escalating their <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49747-unauthorized-privilege-elevation-in-azure-machine-learning\/\"  data-wpil-monitor-id=\"68730\">privileges and potentially gaining unauthorized<\/a> access to sensitive information or control over the system.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-441302226\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>The following is a conceptual example of how an attacker might exploit this vulnerability. In this case, the attacker sends a malicious HTTP <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36845-server-side-request-forgery-ssrf-vulnerability-in-eveo-urve-web-manager\/\"  data-wpil-monitor-id=\"70698\">request to the vulnerable<\/a> endpoint:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/wp-json\/onlyoffice\/v1\/callback HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/json\n{\n&quot;attachment&quot;: {\n&quot;id&quot;: &quot;&lt;encrypted_attachment_id&gt;&quot;,\n&quot;userid&quot;: &quot;&lt;arbitrary_user_id&gt;&quot;\n}\n}<\/code><\/pre>\n<p>In this example, `<encrypted_attachment_id>` is a valid encrypted attachment ID, and `<arbitrary_user_id>` is the user ID of the victim. This request could potentially allow the attacker to log in as the victim, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-41668-critical-file-replacement-leading-to-unauthorized-access\/\"  data-wpil-monitor-id=\"66531\">leading to unauthorized<\/a> access and potential data leakage.<\/p>\n<p><strong>Mitigation and Prevention<\/strong><\/p>\n<p>To mitigate this vulnerability, affected users are advised to apply the vendor&#8217;s patch as soon as possible. If the patch cannot be applied immediately, the use of a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can serve as a temporary mitigation strategy. Regularly updating all software and <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5243-critical-security-vulnerability-in-smg-software-information-portal\/\"  data-wpil-monitor-id=\"68021\">plugins<\/a> to their latest versions can help prevent future vulnerabilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The cybersecurity landscape faces a new threat in the form of a severe vulnerability in the ONLYOFFICE Docs plugin for WordPress. The vulnerability, identified as CVE-2025-6380, potentially affects a vast number of websites using the ONLYOFFICE Docs plugin, ranging from versions 1.1.0 to 2.2.0. The severity of this vulnerability lies in the fact that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[76],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-59742","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-privilege-escalation"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=59742"}],"version-history":[{"count":6,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59742\/revisions"}],"predecessor-version":[{"id":63343,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59742\/revisions\/63343"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=59742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=59742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=59742"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=59742"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=59742"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=59742"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=59742"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=59742"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=59742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}