Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12174: CWE-862 Missing Authorization in wpwax Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings

0
Medium
VulnerabilityCVE-2025-12174cvecve-2025-12174cwe-862
Published: Wed Nov 19 2025 (11/19/2025, 05:45:14 UTC)
Source: CVE Database V5
Vendor/Project: wpwax
Product: Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings

Description

The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'directorist_prepare_listings_export_file' and 'directorist_type_slug_change' AJAX actions in all versions up to, and including, 8.5.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export listing details and change the directorist slug.

AI-Powered Analysis

AILast updated: 11/26/2025, 08:04:25 UTC

Technical Analysis

The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings for WordPress suffers from a missing authorization vulnerability identified as CVE-2025-12174. Specifically, the plugin fails to perform capability checks on two AJAX actions: 'directorist_prepare_listings_export_file' and 'directorist_type_slug_change'. These actions are intended to be restricted to authorized users but are accessible to any authenticated user with Subscriber-level privileges or higher. This allows such users to export sensitive listing details and alter the directory slug, which could disrupt the integrity and availability of the directory data. The vulnerability affects all versions up to and including 8.5.2. The CVSS 3.1 base score is 6.5, indicating a medium severity with network attack vector, low attack complexity, no privileges required (beyond authentication), no user interaction, and impacts on confidentiality and integrity but not availability. No patches or known exploits are currently available, but the flaw represents a significant risk for websites relying on Directorist for business listings, as unauthorized data export and modification could lead to data breaches or reputational damage. The vulnerability was publicly disclosed on November 19, 2025, and assigned by Wordfence. The CWE classification is CWE-862, which relates to missing authorization checks.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of business directory listings, potentially exposing sensitive company information or client data. The ability to change the directory slug could also disrupt business operations by affecting URL structures and accessibility of listings, harming user trust and SEO rankings. Organizations relying on Directorist for classified ads or business listings might face data integrity issues and reputational damage if attackers exploit this flaw. Given the medium severity and ease of exploitation by low-privilege authenticated users, attackers could leverage compromised or low-level user accounts to escalate their impact. This is particularly concerning for sectors with sensitive business data such as finance, legal, and healthcare directories. Additionally, the lack of known exploits currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

European organizations should immediately verify if they use the Directorist plugin and identify the version in use. Since no official patches are currently available, temporary mitigations include restricting user roles that can authenticate on the WordPress site, especially limiting Subscriber-level access to trusted users only. Administrators should audit user accounts for suspicious activity and remove or restrict unnecessary accounts. Implementing Web Application Firewall (WAF) rules to monitor and block unauthorized AJAX requests targeting 'directorist_prepare_listings_export_file' and 'directorist_type_slug_change' endpoints can reduce exploitation risk. Monitoring logs for unusual export or slug change activities is recommended. Organizations should subscribe to vendor updates and apply official patches promptly once released. Additionally, consider isolating the WordPress environment and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of account compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-24T15:42:34.711Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691d6897a27e6d5e91bc16bc

Added to database: 11/19/2025, 6:49:59 AM

Last enriched: 11/26/2025, 8:04:25 AM

Last updated: 1/8/2026, 7:39:10 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats