CVE-2025-12174: CWE-862 Missing Authorization in wpwax Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings
The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'directorist_prepare_listings_export_file' and 'directorist_type_slug_change' AJAX actions in all versions up to, and including, 8.5.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export listing details and change the directorist slug.
AI Analysis
Technical Summary
CVE-2025-12174 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings for WordPress. The issue arises from the absence of proper capability checks on two AJAX actions: 'directorist_prepare_listings_export_file' and 'directorist_type_slug_change'. These actions allow authenticated users with minimal privileges (Subscriber-level or above) to export sensitive listing data and modify the directory slug, respectively. Since the plugin does not verify whether the user has the appropriate permissions before executing these actions, it enables unauthorized access and modification of data. The vulnerability affects all versions up to 8.5.2 inclusive. The CVSS v3.1 score is 6.5, indicating a medium severity level, with the vector showing network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, and low impact on confidentiality and integrity, with no impact on availability. Although no known exploits have been reported in the wild, the flaw poses a risk to the confidentiality of business listings and the integrity of directory configurations. The vulnerability is particularly concerning for websites that rely on Directorist for managing business directories and classified ads, as unauthorized export of listings could lead to data leakage, and slug changes could disrupt site functionality or SEO. The issue was publicly disclosed on November 19, 2025, and no official patches are linked yet, suggesting organizations must monitor vendor updates closely.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive business directory data, potentially exposing client or partner information. The ability to change the directory slug could also disrupt web presence, affecting SEO and user access to listings, which can harm business reputation and operational continuity. Organizations relying on Directorist for classified ads or business listings may face data confidentiality breaches and integrity issues, which could lead to regulatory compliance challenges under GDPR if personal data is involved. The medium severity indicates moderate risk, but the ease of exploitation by low-privileged authenticated users increases the threat surface, especially in environments where subscriber accounts are common or easily obtained. This vulnerability could be leveraged in targeted attacks against small and medium enterprises or local business directories prevalent in Europe, potentially facilitating further lateral movement or information gathering by attackers.
Mitigation Recommendations
Immediate mitigation steps include restricting Subscriber-level accounts from accessing the affected AJAX endpoints by implementing custom capability checks or disabling these AJAX actions via WordPress hooks if patching is not yet available. Organizations should monitor user activity logs for unusual export actions or slug changes and enforce strong authentication and account management policies to limit the creation and use of low-privileged accounts. Applying the vendor’s patch promptly once released is critical. Additionally, web application firewalls (WAFs) can be configured to detect and block suspicious AJAX requests targeting these endpoints. Regular security audits of WordPress plugins and minimizing plugin usage to only trusted and necessary components will reduce exposure. Backup and recovery plans should be updated to quickly restore any unauthorized changes to directory slugs or data exports.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-12174: CWE-862 Missing Authorization in wpwax Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings
Description
The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'directorist_prepare_listings_export_file' and 'directorist_type_slug_change' AJAX actions in all versions up to, and including, 8.5.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export listing details and change the directorist slug.
AI-Powered Analysis
Technical Analysis
CVE-2025-12174 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings for WordPress. The issue arises from the absence of proper capability checks on two AJAX actions: 'directorist_prepare_listings_export_file' and 'directorist_type_slug_change'. These actions allow authenticated users with minimal privileges (Subscriber-level or above) to export sensitive listing data and modify the directory slug, respectively. Since the plugin does not verify whether the user has the appropriate permissions before executing these actions, it enables unauthorized access and modification of data. The vulnerability affects all versions up to 8.5.2 inclusive. The CVSS v3.1 score is 6.5, indicating a medium severity level, with the vector showing network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, and low impact on confidentiality and integrity, with no impact on availability. Although no known exploits have been reported in the wild, the flaw poses a risk to the confidentiality of business listings and the integrity of directory configurations. The vulnerability is particularly concerning for websites that rely on Directorist for managing business directories and classified ads, as unauthorized export of listings could lead to data leakage, and slug changes could disrupt site functionality or SEO. The issue was publicly disclosed on November 19, 2025, and no official patches are linked yet, suggesting organizations must monitor vendor updates closely.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive business directory data, potentially exposing client or partner information. The ability to change the directory slug could also disrupt web presence, affecting SEO and user access to listings, which can harm business reputation and operational continuity. Organizations relying on Directorist for classified ads or business listings may face data confidentiality breaches and integrity issues, which could lead to regulatory compliance challenges under GDPR if personal data is involved. The medium severity indicates moderate risk, but the ease of exploitation by low-privileged authenticated users increases the threat surface, especially in environments where subscriber accounts are common or easily obtained. This vulnerability could be leveraged in targeted attacks against small and medium enterprises or local business directories prevalent in Europe, potentially facilitating further lateral movement or information gathering by attackers.
Mitigation Recommendations
Immediate mitigation steps include restricting Subscriber-level accounts from accessing the affected AJAX endpoints by implementing custom capability checks or disabling these AJAX actions via WordPress hooks if patching is not yet available. Organizations should monitor user activity logs for unusual export actions or slug changes and enforce strong authentication and account management policies to limit the creation and use of low-privileged accounts. Applying the vendor’s patch promptly once released is critical. Additionally, web application firewalls (WAFs) can be configured to detect and block suspicious AJAX requests targeting these endpoints. Regular security audits of WordPress plugins and minimizing plugin usage to only trusted and necessary components will reduce exposure. Backup and recovery plans should be updated to quickly restore any unauthorized changes to directory slugs or data exports.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-24T15:42:34.711Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691d6897a27e6d5e91bc16bc
Added to database: 11/19/2025, 6:49:59 AM
Last enriched: 11/19/2025, 6:50:17 AM
Last updated: 11/22/2025, 7:44:45 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumCVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
MediumCVE-2025-12752: CWE-345 Insufficient Verification of Data Authenticity in scottpaterson Subscriptions & Memberships for PayPal
MediumCVE-2025-11186: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in humanityco Cookie Notice & Compliance for GDPR / CCPA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.