Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12174: CWE-862 Missing Authorization in wpwax Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings

0
Medium
VulnerabilityCVE-2025-12174cvecve-2025-12174cwe-862
Published: Wed Nov 19 2025 (11/19/2025, 05:45:14 UTC)
Source: CVE Database V5
Vendor/Project: wpwax
Product: Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings

Description

The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'directorist_prepare_listings_export_file' and 'directorist_type_slug_change' AJAX actions in all versions up to, and including, 8.5.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export listing details and change the directorist slug.

AI-Powered Analysis

AILast updated: 11/19/2025, 06:50:17 UTC

Technical Analysis

CVE-2025-12174 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings for WordPress. The issue arises from the absence of proper capability checks on two AJAX actions: 'directorist_prepare_listings_export_file' and 'directorist_type_slug_change'. These actions allow authenticated users with minimal privileges (Subscriber-level or above) to export sensitive listing data and modify the directory slug, respectively. Since the plugin does not verify whether the user has the appropriate permissions before executing these actions, it enables unauthorized access and modification of data. The vulnerability affects all versions up to 8.5.2 inclusive. The CVSS v3.1 score is 6.5, indicating a medium severity level, with the vector showing network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, and low impact on confidentiality and integrity, with no impact on availability. Although no known exploits have been reported in the wild, the flaw poses a risk to the confidentiality of business listings and the integrity of directory configurations. The vulnerability is particularly concerning for websites that rely on Directorist for managing business directories and classified ads, as unauthorized export of listings could lead to data leakage, and slug changes could disrupt site functionality or SEO. The issue was publicly disclosed on November 19, 2025, and no official patches are linked yet, suggesting organizations must monitor vendor updates closely.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive business directory data, potentially exposing client or partner information. The ability to change the directory slug could also disrupt web presence, affecting SEO and user access to listings, which can harm business reputation and operational continuity. Organizations relying on Directorist for classified ads or business listings may face data confidentiality breaches and integrity issues, which could lead to regulatory compliance challenges under GDPR if personal data is involved. The medium severity indicates moderate risk, but the ease of exploitation by low-privileged authenticated users increases the threat surface, especially in environments where subscriber accounts are common or easily obtained. This vulnerability could be leveraged in targeted attacks against small and medium enterprises or local business directories prevalent in Europe, potentially facilitating further lateral movement or information gathering by attackers.

Mitigation Recommendations

Immediate mitigation steps include restricting Subscriber-level accounts from accessing the affected AJAX endpoints by implementing custom capability checks or disabling these AJAX actions via WordPress hooks if patching is not yet available. Organizations should monitor user activity logs for unusual export actions or slug changes and enforce strong authentication and account management policies to limit the creation and use of low-privileged accounts. Applying the vendor’s patch promptly once released is critical. Additionally, web application firewalls (WAFs) can be configured to detect and block suspicious AJAX requests targeting these endpoints. Regular security audits of WordPress plugins and minimizing plugin usage to only trusted and necessary components will reduce exposure. Backup and recovery plans should be updated to quickly restore any unauthorized changes to directory slugs or data exports.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-24T15:42:34.711Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691d6897a27e6d5e91bc16bc

Added to database: 11/19/2025, 6:49:59 AM

Last enriched: 11/19/2025, 6:50:17 AM

Last updated: 11/22/2025, 7:44:45 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats