CVE-2025-12574: CWE-862 Missing Authorization in passionui Listar – Directory Listing & Classifieds WordPress Plugin
The Listar – Directory Listing & Classifieds WordPress Plugin plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the '/wp-json/listar/v1/place/delete' REST API endpoint in all versions up to, and including, 3.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts.
AI Analysis
Technical Summary
CVE-2025-12574 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Listar – Directory Listing & Classifieds WordPress plugin developed by passionui. The issue arises from the absence of proper capability checks on the REST API endpoint '/wp-json/listar/v1/place/delete', which is responsible for deleting posts. This flaw allows any authenticated user with Subscriber-level privileges or higher to invoke this endpoint and delete arbitrary posts without proper authorization. Since WordPress Subscriber roles typically have minimal permissions, this vulnerability significantly elevates the risk by enabling low-privilege users to perform unauthorized destructive actions. The vulnerability affects all versions up to and including 3.0.0 of the plugin. The CVSS 3.1 base score is 4.3 (medium severity), with an attack vector of network, low attack complexity, requiring privileges, no user interaction, and impacting integrity only. There are no known public exploits or patches available at the time of publication. The vulnerability does not affect confidentiality or availability but compromises data integrity by allowing unauthorized deletion of content. This can disrupt business operations, especially for websites relying on directory listings or classified ads for revenue or user engagement. The vulnerability was reserved on 2025-10-31 and published on 2025-12-06 by Wordfence.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of website content managed via the Listar plugin. Unauthorized deletion of posts can lead to loss of critical business data, disruption of services, and damage to reputation. Organizations using this plugin for commercial directory listings or classifieds may experience operational interruptions and customer dissatisfaction. Although the vulnerability does not directly expose sensitive data or cause denial of service, the ability for low-privilege users to delete content could be exploited for sabotage or competitive advantage. The impact is more pronounced for organizations with multiple users having Subscriber-level access, such as community-driven platforms or multi-user editorial sites. Recovery from such attacks may require restoring data from backups, incurring downtime and resource costs. Additionally, regulatory compliance issues could arise if data integrity is compromised, especially under GDPR mandates for data protection and availability.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting Subscriber-level access strictly to trusted users and auditing user roles to minimize unnecessary privileges. Implement web application firewall (WAF) rules to monitor and block unauthorized REST API calls to '/wp-json/listar/v1/place/delete'. Disable or restrict REST API access for unauthenticated or low-privilege users if feasible. Regularly back up website content to enable quick restoration in case of unauthorized deletions. Monitor logs for suspicious API activity and unusual deletion patterns. Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. Consider temporarily disabling the Listar plugin if the risk outweighs operational needs until a fix is deployed. Employ security plugins that enhance WordPress authorization checks and REST API protections. Finally, educate site administrators and users about the risks of privilege escalation and the importance of role management.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12574: CWE-862 Missing Authorization in passionui Listar – Directory Listing & Classifieds WordPress Plugin
Description
The Listar – Directory Listing & Classifieds WordPress Plugin plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the '/wp-json/listar/v1/place/delete' REST API endpoint in all versions up to, and including, 3.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts.
AI-Powered Analysis
Technical Analysis
CVE-2025-12574 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Listar – Directory Listing & Classifieds WordPress plugin developed by passionui. The issue arises from the absence of proper capability checks on the REST API endpoint '/wp-json/listar/v1/place/delete', which is responsible for deleting posts. This flaw allows any authenticated user with Subscriber-level privileges or higher to invoke this endpoint and delete arbitrary posts without proper authorization. Since WordPress Subscriber roles typically have minimal permissions, this vulnerability significantly elevates the risk by enabling low-privilege users to perform unauthorized destructive actions. The vulnerability affects all versions up to and including 3.0.0 of the plugin. The CVSS 3.1 base score is 4.3 (medium severity), with an attack vector of network, low attack complexity, requiring privileges, no user interaction, and impacting integrity only. There are no known public exploits or patches available at the time of publication. The vulnerability does not affect confidentiality or availability but compromises data integrity by allowing unauthorized deletion of content. This can disrupt business operations, especially for websites relying on directory listings or classified ads for revenue or user engagement. The vulnerability was reserved on 2025-10-31 and published on 2025-12-06 by Wordfence.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of website content managed via the Listar plugin. Unauthorized deletion of posts can lead to loss of critical business data, disruption of services, and damage to reputation. Organizations using this plugin for commercial directory listings or classifieds may experience operational interruptions and customer dissatisfaction. Although the vulnerability does not directly expose sensitive data or cause denial of service, the ability for low-privilege users to delete content could be exploited for sabotage or competitive advantage. The impact is more pronounced for organizations with multiple users having Subscriber-level access, such as community-driven platforms or multi-user editorial sites. Recovery from such attacks may require restoring data from backups, incurring downtime and resource costs. Additionally, regulatory compliance issues could arise if data integrity is compromised, especially under GDPR mandates for data protection and availability.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting Subscriber-level access strictly to trusted users and auditing user roles to minimize unnecessary privileges. Implement web application firewall (WAF) rules to monitor and block unauthorized REST API calls to '/wp-json/listar/v1/place/delete'. Disable or restrict REST API access for unauthenticated or low-privilege users if feasible. Regularly back up website content to enable quick restoration in case of unauthorized deletions. Monitor logs for suspicious API activity and unusual deletion patterns. Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. Consider temporarily disabling the Listar plugin if the risk outweighs operational needs until a fix is deployed. Employ security plugins that enhance WordPress authorization checks and REST API protections. Finally, educate site administrators and users about the risks of privilege escalation and the importance of role management.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-31T21:03:13.438Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6933c71c11163305efef352c
Added to database: 12/6/2025, 6:03:08 AM
Last enriched: 12/13/2025, 7:10:24 AM
Last updated: 2/4/2026, 7:30:13 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24447: Improper neutralization of formula elements in a CSV file in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-23704: Unrestricted upload of file with dangerous type in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-22875: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-21393: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-1756: CWE-434 Unrestricted Upload of File with Dangerous Type in seezee WP FOFT Loader
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.