6.3
CVE-2025-49952
- EPSS 0.07%
- Veröffentlicht 22.10.2025 14:32:19
- Zuletzt bearbeitet 20.01.2026 15:16:45
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
Houzez <= 4.1.1 - Authenticated (Subscriber+) Insecure Direct Object Reference
Authorization Bypass Through User-Controlled Key vulnerability in favethemes Houzez houzez allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Houzez: from n/a through <= 4.1.1.
Mögliche Gegenmaßnahme
Houzez: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Weitere Schwachstelleninformationen
SystemWordPress Theme
≫
Produkt
Houzez
Version
*-4.1.1
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Herstellerfavethemes
≫
Produkt
Houzez
Default Statusunaffected
Version <=
<= 4.1.1
Version
n/a
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.203 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 6.3 | 2.8 | 3.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.