CVE-2022-3930: CWE-639 Authorization Bypass Through User-Controlled Key in Unknown Directorist
The Directorist WordPress plugin before 7.4.2.2 suffers from an IDOR vulnerability which an attacker can exploit to change the password of arbitrary users instead of his own.
AI Analysis
Technical Summary
CVE-2022-3930 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Directorist WordPress plugin versions prior to 7.4.2.2. Directorist is a plugin used to create directory and listing websites on WordPress platforms. The vulnerability allows an attacker with limited privileges (requiring at least some level of authentication) to exploit an Insecure Direct Object Reference (IDOR) flaw. Specifically, the attacker can manipulate user-controlled keys or identifiers to change the password of arbitrary users instead of being restricted to changing only their own password. This bypasses normal authorization checks that should prevent users from modifying other users’ credentials. The vulnerability is remotely exploitable over the network without user interaction, and the attack complexity is low, as it requires only authenticated access but no special privileges beyond that. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the high impact on integrity (unauthorized password changes) but no direct impact on confidentiality or availability. No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in November 2022 and publicly disclosed in December 2022. No official patch links are provided in the data, but it is implied that versions 7.4.2.2 and later address the issue. Since Directorist is a WordPress plugin, the vulnerability affects any WordPress site using the affected versions of this plugin, potentially exposing user accounts to takeover or unauthorized password resets by authenticated attackers.
Potential Impact
For European organizations, the impact of this vulnerability can be significant depending on the use of the Directorist plugin within their WordPress infrastructure. Organizations running directory or listing websites that rely on Directorist may face unauthorized password changes leading to account takeover, privilege escalation, and potential lateral movement within their web environment. This can compromise the integrity of user accounts, disrupt business operations, and damage reputation. While the vulnerability does not directly expose confidential data or cause denial of service, the ability to change arbitrary user passwords can facilitate further attacks such as phishing, fraud, or unauthorized access to sensitive internal resources if the compromised accounts have elevated privileges. Small and medium enterprises (SMEs) and public sector entities using WordPress for public-facing directories are particularly at risk. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially given the low complexity of exploitation and the widespread use of WordPress in Europe. Organizations in sectors with high reliance on web presence and user account management (e.g., tourism, local government, education) should be vigilant.
Mitigation Recommendations
1. Immediate upgrade of the Directorist plugin to version 7.4.2.2 or later where the vulnerability is patched. 2. Implement strict access controls and role-based permissions within WordPress to limit which users can change passwords or manage user accounts. 3. Monitor WordPress logs for unusual password change activities, especially those initiated by non-administrative users. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting user password change endpoints. 5. Conduct regular security audits of WordPress plugins and themes to identify outdated or vulnerable components. 6. Educate users and administrators about the risks of privilege escalation and encourage strong, unique passwords and multi-factor authentication (MFA) where possible. 7. If immediate patching is not possible, consider temporarily disabling the password change functionality or restricting it to trusted IP addresses or user roles. 8. Use security plugins that can detect and alert on IDOR or authorization bypass attempts. These steps go beyond generic advice by focusing on plugin-specific patching, monitoring, and access control tailored to the nature of the vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2022-3930: CWE-639 Authorization Bypass Through User-Controlled Key in Unknown Directorist
Description
The Directorist WordPress plugin before 7.4.2.2 suffers from an IDOR vulnerability which an attacker can exploit to change the password of arbitrary users instead of his own.
AI-Powered Analysis
Technical Analysis
CVE-2022-3930 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Directorist WordPress plugin versions prior to 7.4.2.2. Directorist is a plugin used to create directory and listing websites on WordPress platforms. The vulnerability allows an attacker with limited privileges (requiring at least some level of authentication) to exploit an Insecure Direct Object Reference (IDOR) flaw. Specifically, the attacker can manipulate user-controlled keys or identifiers to change the password of arbitrary users instead of being restricted to changing only their own password. This bypasses normal authorization checks that should prevent users from modifying other users’ credentials. The vulnerability is remotely exploitable over the network without user interaction, and the attack complexity is low, as it requires only authenticated access but no special privileges beyond that. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the high impact on integrity (unauthorized password changes) but no direct impact on confidentiality or availability. No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in November 2022 and publicly disclosed in December 2022. No official patch links are provided in the data, but it is implied that versions 7.4.2.2 and later address the issue. Since Directorist is a WordPress plugin, the vulnerability affects any WordPress site using the affected versions of this plugin, potentially exposing user accounts to takeover or unauthorized password resets by authenticated attackers.
Potential Impact
For European organizations, the impact of this vulnerability can be significant depending on the use of the Directorist plugin within their WordPress infrastructure. Organizations running directory or listing websites that rely on Directorist may face unauthorized password changes leading to account takeover, privilege escalation, and potential lateral movement within their web environment. This can compromise the integrity of user accounts, disrupt business operations, and damage reputation. While the vulnerability does not directly expose confidential data or cause denial of service, the ability to change arbitrary user passwords can facilitate further attacks such as phishing, fraud, or unauthorized access to sensitive internal resources if the compromised accounts have elevated privileges. Small and medium enterprises (SMEs) and public sector entities using WordPress for public-facing directories are particularly at risk. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially given the low complexity of exploitation and the widespread use of WordPress in Europe. Organizations in sectors with high reliance on web presence and user account management (e.g., tourism, local government, education) should be vigilant.
Mitigation Recommendations
1. Immediate upgrade of the Directorist plugin to version 7.4.2.2 or later where the vulnerability is patched. 2. Implement strict access controls and role-based permissions within WordPress to limit which users can change passwords or manage user accounts. 3. Monitor WordPress logs for unusual password change activities, especially those initiated by non-administrative users. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting user password change endpoints. 5. Conduct regular security audits of WordPress plugins and themes to identify outdated or vulnerable components. 6. Educate users and administrators about the risks of privilege escalation and encourage strong, unique passwords and multi-factor authentication (MFA) where possible. 7. If immediate patching is not possible, consider temporarily disabling the password change functionality or restricting it to trusted IP addresses or user roles. 8. Use security plugins that can detect and alert on IDOR or authorization bypass attempts. These steps go beyond generic advice by focusing on plugin-specific patching, monitoring, and access control tailored to the nature of the vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-11-10T16:15:50.748Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf66ab
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/22/2025, 12:20:46 AM
Last updated: 7/26/2025, 2:13:17 AM
Views: 10
Related Threats
CVE-2025-8854: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in bulletphysics bullet3
HighCVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCVE-2025-54878: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib
HighCVE-2025-40920: CWE-340 Generation of Predictable Numbers or Identifiers in ETHER Catalyst::Authentication::Credential::HTTP
HighCarmaker’s Portal Vulnerability Could Have Allowed Hackers to Unlock Vehicles and Access Data
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.