CVE-2025-0763: CWE-862 Missing Authorization in webcodingplace Ultimate Classified Listings
The Ultimate Classified Listings plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_custom_fields function in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change plugin custom fields.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-0763 affects the Ultimate Classified Listings plugin for WordPress, developed by webcodingplace. The root cause is a missing authorization check (CWE-862) in the save_custom_fields function, which is responsible for saving custom field data within the plugin. Because this function does not verify whether the user has the appropriate capabilities, any authenticated user with at least Subscriber-level access can modify custom fields arbitrarily. This flaw allows unauthorized modification of plugin data, potentially leading to data integrity issues such as incorrect listings or manipulated content. The vulnerability does not expose confidential information nor does it allow denial of service. Exploitation requires the attacker to be authenticated, but no additional user interaction is necessary. The vulnerability affects all versions up to and including 1.6 of the plugin, which is commonly used in WordPress environments for classified ad listings. Although no public exploits have been reported, the ease of exploitation by low-privilege authenticated users makes this a concern for website administrators. The CVSS v3.1 base score is 4.3, reflecting network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact.
Potential Impact
The primary impact of this vulnerability is unauthorized modification of plugin custom fields, which can undermine data integrity on affected WordPress sites. Attackers with Subscriber-level access can alter classified listings or other plugin-managed data, potentially misleading users or damaging the reputation of the site. While confidentiality and availability are not directly affected, the integrity compromise could facilitate further attacks such as social engineering or fraud if malicious content is inserted. Organizations relying on this plugin for classified ads or listings may face operational disruptions or loss of user trust. Since the vulnerability requires authenticated access, the risk is limited to environments where user registration is enabled and attackers can obtain Subscriber-level accounts. However, many WordPress sites allow user registration, increasing the attack surface. The absence of known exploits reduces immediate risk, but the vulnerability remains a medium threat that should be addressed promptly to avoid exploitation.
Mitigation Recommendations
To mitigate CVE-2025-0763, organizations should first check for and apply any available patches or updates from the plugin vendor once released. In the absence of an official patch, administrators can implement the following specific measures: 1) Restrict user registration or limit Subscriber-level permissions to trusted users only, reducing the pool of potential attackers. 2) Implement a Web Application Firewall (WAF) with custom rules to monitor and block unauthorized POST requests targeting the save_custom_fields function or related plugin endpoints. 3) Conduct a code review or apply a temporary patch to add proper capability checks in the save_custom_fields function, ensuring only authorized roles (e.g., Administrator or Editor) can modify custom fields. 4) Monitor logs for suspicious activity related to plugin data modifications, especially from low-privilege accounts. 5) Educate site administrators and users about the risk and encourage strong authentication practices to prevent account compromise. These targeted mitigations go beyond generic advice by focusing on controlling access and monitoring the specific vulnerable functionality until an official fix is available.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Brazil, Netherlands, Japan
CVE-2025-0763: CWE-862 Missing Authorization in webcodingplace Ultimate Classified Listings
Description
The Ultimate Classified Listings plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_custom_fields function in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change plugin custom fields.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-0763 affects the Ultimate Classified Listings plugin for WordPress, developed by webcodingplace. The root cause is a missing authorization check (CWE-862) in the save_custom_fields function, which is responsible for saving custom field data within the plugin. Because this function does not verify whether the user has the appropriate capabilities, any authenticated user with at least Subscriber-level access can modify custom fields arbitrarily. This flaw allows unauthorized modification of plugin data, potentially leading to data integrity issues such as incorrect listings or manipulated content. The vulnerability does not expose confidential information nor does it allow denial of service. Exploitation requires the attacker to be authenticated, but no additional user interaction is necessary. The vulnerability affects all versions up to and including 1.6 of the plugin, which is commonly used in WordPress environments for classified ad listings. Although no public exploits have been reported, the ease of exploitation by low-privilege authenticated users makes this a concern for website administrators. The CVSS v3.1 base score is 4.3, reflecting network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact.
Potential Impact
The primary impact of this vulnerability is unauthorized modification of plugin custom fields, which can undermine data integrity on affected WordPress sites. Attackers with Subscriber-level access can alter classified listings or other plugin-managed data, potentially misleading users or damaging the reputation of the site. While confidentiality and availability are not directly affected, the integrity compromise could facilitate further attacks such as social engineering or fraud if malicious content is inserted. Organizations relying on this plugin for classified ads or listings may face operational disruptions or loss of user trust. Since the vulnerability requires authenticated access, the risk is limited to environments where user registration is enabled and attackers can obtain Subscriber-level accounts. However, many WordPress sites allow user registration, increasing the attack surface. The absence of known exploits reduces immediate risk, but the vulnerability remains a medium threat that should be addressed promptly to avoid exploitation.
Mitigation Recommendations
To mitigate CVE-2025-0763, organizations should first check for and apply any available patches or updates from the plugin vendor once released. In the absence of an official patch, administrators can implement the following specific measures: 1) Restrict user registration or limit Subscriber-level permissions to trusted users only, reducing the pool of potential attackers. 2) Implement a Web Application Firewall (WAF) with custom rules to monitor and block unauthorized POST requests targeting the save_custom_fields function or related plugin endpoints. 3) Conduct a code review or apply a temporary patch to add proper capability checks in the save_custom_fields function, ensuring only authorized roles (e.g., Administrator or Editor) can modify custom fields. 4) Monitor logs for suspicious activity related to plugin data modifications, especially from low-privilege accounts. 5) Educate site administrators and users about the risk and encourage strong authentication practices to prevent account compromise. These targeted mitigations go beyond generic advice by focusing on controlling access and monitoring the specific vulnerable functionality until an official fix is available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-27T21:23:47.479Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c27a21e1c560fa9d94d419
Added to database: 9/11/2025, 7:28:33 AM
Last enriched: 2/27/2026, 5:50:16 PM
Last updated: 3/22/2026, 12:38:19 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.