CVE-2025-0763: CWE-862 Missing Authorization in webcodingplace Ultimate Classified Listings
The Ultimate Classified Listings plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_custom_fields function in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change plugin custom fields.
AI Analysis
Technical Summary
CVE-2025-0763 is a medium-severity vulnerability affecting the Ultimate Classified Listings plugin for WordPress, developed by webcodingplace. The vulnerability arises from a missing authorization check in the plugin's save_custom_fields function across all versions up to and including 1.6. This flaw allows any authenticated user with Subscriber-level access or higher to modify plugin custom fields without proper permission validation. Technically, the issue is categorized under CWE-862 (Missing Authorization), indicating that the plugin fails to verify whether the user has the necessary capabilities before allowing data modifications. Since WordPress Subscriber roles typically have minimal privileges, this vulnerability significantly lowers the attacker's bar to tamper with plugin data. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (remote), requires low attack complexity, and only low privileges (authenticated user) are needed. No user interaction is required, and the impact is limited to integrity (modification of data) without affecting confidentiality or availability. No known exploits have been reported in the wild, and no patches are currently linked, suggesting that mitigation relies on vendor updates or manual code fixes. This vulnerability could be exploited by attackers who have gained subscriber-level access, possibly through credential stuffing, phishing, or other means, to alter classified listing data, potentially misleading users or damaging the website's credibility.
Potential Impact
For European organizations using WordPress sites with the Ultimate Classified Listings plugin, this vulnerability poses a risk to data integrity within the plugin's scope. Attackers with low-level authenticated access can manipulate classified listing information, which could lead to misinformation, fraudulent listings, or reputational damage. While it does not directly compromise sensitive user data or site availability, the unauthorized modification of listings can undermine trust and potentially facilitate further attacks or scams. Organizations relying on classified listings for business operations, customer engagement, or community services may experience operational disruptions or loss of user confidence. Additionally, regulatory compliance under GDPR may be indirectly impacted if manipulated data leads to misinformation affecting users or customers. The vulnerability's exploitation could also serve as a foothold for privilege escalation or lateral movement within the WordPress environment if combined with other vulnerabilities.
Mitigation Recommendations
To mitigate CVE-2025-0763, European organizations should: 1) Immediately audit WordPress installations to identify the presence of the Ultimate Classified Listings plugin and its version. 2) Restrict Subscriber-level user registrations or enforce stricter user verification to reduce the risk of unauthorized access. 3) Implement custom capability checks or patches in the plugin code to enforce authorization on the save_custom_fields function until an official patch is released. 4) Monitor and log changes to classified listings and plugin custom fields to detect unauthorized modifications promptly. 5) Employ Web Application Firewalls (WAFs) with rules targeting suspicious authenticated user behavior related to plugin data modifications. 6) Educate site administrators and users about the risks of credential compromise and enforce strong password policies and multi-factor authentication to limit attacker access. 7) Stay updated with vendor announcements for official patches and apply them promptly once available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-0763: CWE-862 Missing Authorization in webcodingplace Ultimate Classified Listings
Description
The Ultimate Classified Listings plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_custom_fields function in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change plugin custom fields.
AI-Powered Analysis
Technical Analysis
CVE-2025-0763 is a medium-severity vulnerability affecting the Ultimate Classified Listings plugin for WordPress, developed by webcodingplace. The vulnerability arises from a missing authorization check in the plugin's save_custom_fields function across all versions up to and including 1.6. This flaw allows any authenticated user with Subscriber-level access or higher to modify plugin custom fields without proper permission validation. Technically, the issue is categorized under CWE-862 (Missing Authorization), indicating that the plugin fails to verify whether the user has the necessary capabilities before allowing data modifications. Since WordPress Subscriber roles typically have minimal privileges, this vulnerability significantly lowers the attacker's bar to tamper with plugin data. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (remote), requires low attack complexity, and only low privileges (authenticated user) are needed. No user interaction is required, and the impact is limited to integrity (modification of data) without affecting confidentiality or availability. No known exploits have been reported in the wild, and no patches are currently linked, suggesting that mitigation relies on vendor updates or manual code fixes. This vulnerability could be exploited by attackers who have gained subscriber-level access, possibly through credential stuffing, phishing, or other means, to alter classified listing data, potentially misleading users or damaging the website's credibility.
Potential Impact
For European organizations using WordPress sites with the Ultimate Classified Listings plugin, this vulnerability poses a risk to data integrity within the plugin's scope. Attackers with low-level authenticated access can manipulate classified listing information, which could lead to misinformation, fraudulent listings, or reputational damage. While it does not directly compromise sensitive user data or site availability, the unauthorized modification of listings can undermine trust and potentially facilitate further attacks or scams. Organizations relying on classified listings for business operations, customer engagement, or community services may experience operational disruptions or loss of user confidence. Additionally, regulatory compliance under GDPR may be indirectly impacted if manipulated data leads to misinformation affecting users or customers. The vulnerability's exploitation could also serve as a foothold for privilege escalation or lateral movement within the WordPress environment if combined with other vulnerabilities.
Mitigation Recommendations
To mitigate CVE-2025-0763, European organizations should: 1) Immediately audit WordPress installations to identify the presence of the Ultimate Classified Listings plugin and its version. 2) Restrict Subscriber-level user registrations or enforce stricter user verification to reduce the risk of unauthorized access. 3) Implement custom capability checks or patches in the plugin code to enforce authorization on the save_custom_fields function until an official patch is released. 4) Monitor and log changes to classified listings and plugin custom fields to detect unauthorized modifications promptly. 5) Employ Web Application Firewalls (WAFs) with rules targeting suspicious authenticated user behavior related to plugin data modifications. 6) Educate site administrators and users about the risks of credential compromise and enforce strong password policies and multi-factor authentication to limit attacker access. 7) Stay updated with vendor announcements for official patches and apply them promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-27T21:23:47.479Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c27a21e1c560fa9d94d419
Added to database: 9/11/2025, 7:28:33 AM
Last enriched: 9/11/2025, 7:39:41 AM
Last updated: 10/30/2025, 8:18:20 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11906: CWE-732 Incorrect Permission Assignment for Critical Resource in Progress Software Flowmon
MediumCVE-2025-11881: CWE-862 Missing Authorization in scottopolis AppPresser – Mobile App Framework
MediumCVE-2025-62229: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-11627: CWE-117 Improper Output Neutralization for Logs in sminozzi Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue
MediumCVE-2025-10008: CWE-862 Missing Authorization in remyb92 Translate WordPress and go Multilingual – Weglot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.