CVE-2025-71278
Published: 01 April 2026
Summary
CVE-2025-71278 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Xenforo Xenforo. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations in XenForo to prevent OAuth2 clients from accessing resources beyond intended scopes.
Applies least privilege to limit OAuth2 client applications to only necessary scopes, mitigating unauthorized access escalation.
Establishes requirements and monitoring for authorization servers like XenForo to ensure proper scope validation in OAuth2 deployments.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct network-exploitable authorization bypass in public-facing web app (XenForo OAuth2) enabling privilege escalation to unauthorized scopes/resources.
NVD Description
XenForo before 2.3.5 allows OAuth2 client applications to request unauthorized scopes. This affects any customer using OAuth2 clients on any version of XenForo 2.3 prior to 2.3.5, potentially allowing client applications to gain access beyond their intended authorization level.
Deeper analysisAI
CVE-2025-71278 is a vulnerability in XenForo versions prior to 2.3.5 that allows OAuth2 client applications to request unauthorized scopes, violating the principle of incorrect authorization (CWE-863). This issue affects any XenForo 2.3 deployment utilizing OAuth2 clients, enabling those clients to potentially access resources beyond their intended authorization levels. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.
An attacker with low privileges, such as a registered user able to register or control an OAuth2 client application, can exploit this vulnerability over the network without user interaction. By requesting excessive scopes during the OAuth2 authorization process, the attacker could gain elevated access to user data, administrative functions, or other protected resources, surpassing the permissions originally granted by the resource owner.
Advisories from VulnCheck and the official XenForo community announcement recommend upgrading to XenForo 2.3.5, which includes a security fix addressing the unauthorized scope requests in OAuth2 clients. Affected customers using OAuth2 integrations should apply this patch promptly to prevent exploitation.
Details
- CWE(s)