Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12577: CWE-862 Missing Authorization in passionui Listar – Directory Listing & Classifieds WordPress Plugin

0
Medium
VulnerabilityCVE-2025-12577cvecve-2025-12577cwe-862
Published: Sat Dec 06 2025 (12/06/2025, 05:49:31 UTC)
Source: CVE Database V5
Vendor/Project: passionui
Product: Listar – Directory Listing & Classifieds WordPress Plugin

Description

The Listar – Directory Listing & Classifieds WordPress Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the '/wp-json/listar/v1/place/save' REST API endpoint in all versions up to, and including, 3.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update listing details.

AI-Powered Analysis

AILast updated: 12/06/2025, 06:09:18 UTC

Technical Analysis

CVE-2025-12577 is a vulnerability identified in the Listar – Directory Listing & Classifieds WordPress Plugin, affecting all versions up to and including 3.0.0. The root cause is a missing authorization check on the REST API endpoint '/wp-json/listar/v1/place/save', which is responsible for saving or updating listing details within the plugin. This flaw allows any authenticated user with at least Subscriber-level privileges to modify listing data without proper permission validation. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to enforce correct access control policies. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts integrity but not confidentiality or availability. The lack of a patch at the time of publication means that organizations must implement compensating controls to mitigate risk. The vulnerability could be exploited to alter directory listings, potentially misleading users or damaging the reputation of the affected website. Since the plugin is used in WordPress environments, the threat surface includes any website employing this plugin for directory or classified listings. No known exploits have been reported in the wild, but the vulnerability's presence in a popular CMS plugin makes it a candidate for future exploitation.

Potential Impact

For European organizations, this vulnerability primarily threatens the integrity of data managed through the Listar plugin. Unauthorized modification of listings can lead to misinformation, reputational damage, and potential loss of user trust. Organizations relying on directory listings for business operations, customer engagement, or advertising could face operational disruptions or legal implications if manipulated data results in consumer harm. Although the vulnerability does not expose confidential data or cause service outages, the ability for low-privileged users to alter content undermines the trustworthiness of the platform. This is particularly critical for sectors such as tourism, real estate, and local business directories prevalent in Europe. Additionally, attackers could leverage this flaw to insert fraudulent or malicious information, indirectly facilitating phishing or social engineering attacks. The medium severity suggests a moderate risk level but should not be underestimated given the widespread use of WordPress and the plugin's functionality.

Mitigation Recommendations

To mitigate CVE-2025-12577, European organizations should implement the following specific measures: 1) Immediately restrict access to the '/wp-json/listar/v1/place/save' REST API endpoint by limiting it to trusted roles or IP addresses using web application firewalls or custom code hooks. 2) Review and tighten user role assignments to ensure that only necessary users have Subscriber-level or higher privileges, minimizing the attack surface. 3) Monitor and audit changes to listings regularly to detect unauthorized modifications promptly. 4) Disable or restrict REST API access for unauthenticated or low-privilege users where possible. 5) Engage with the plugin vendor or community to obtain patches or updates as soon as they become available and apply them promptly. 6) Employ security plugins that can enforce granular REST API permissions and provide anomaly detection. 7) Educate site administrators about the risk and encourage best practices in user management and plugin updates. These steps go beyond generic advice by focusing on REST API access control and user privilege management specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-31T21:05:04.248Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6933c71c11163305efef3530

Added to database: 12/6/2025, 6:03:08 AM

Last enriched: 12/6/2025, 6:09:18 AM

Last updated: 12/9/2025, 6:47:57 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats