CVE-2025-12833: CWE-639 Authorization Bypass Through User-Controlled Key in paoltaia GeoDirectory – WP Business Directory Plugin and Classified Listings Directory
The GeoDirectory – WP Business Directory Plugin and Classified Listings Directory plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.8.139 via the 'post_attachment_upload' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with author-level access and above, to attach arbitrary image files to arbitrary places.
AI Analysis
Technical Summary
CVE-2025-12833 is a vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting all versions up to and including 2.8.139 of the GeoDirectory – WP Business Directory Plugin and Classified Listings Directory for WordPress. The issue resides in the 'post_attachment_upload' function, where the plugin fails to properly validate a user-controlled key parameter. This lack of validation allows authenticated users with author-level access or higher to bypass intended authorization checks and attach arbitrary image files to arbitrary locations within the directory listings. This form of insecure direct object reference (IDOR) can lead to unauthorized modification of content, potentially undermining the integrity of the website's data and user trust. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based, making exploitation feasible for insiders or compromised accounts with sufficient privileges. The CVSS v3.1 score of 4.3 reflects a medium severity, primarily due to the limited impact on confidentiality and availability but a clear impact on integrity. No public exploits have been reported yet, but the vulnerability poses a risk especially in environments where multiple users have author-level permissions. The plugin is widely used in WordPress environments for business directories and classified listings, which are common in small and medium enterprises. The lack of a patch at the time of reporting necessitates immediate attention to mitigate potential exploitation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized content modifications within business directories or classified listings hosted on WordPress sites using the affected plugin. While it does not directly compromise confidentiality or availability, the integrity of the website content can be compromised, potentially damaging the organization's reputation and trustworthiness. Attackers with author-level access could insert misleading or malicious images, which might be used for phishing, misinformation, or brand damage. This is particularly concerning for organizations relying on these directories for customer engagement or lead generation. The impact is more pronounced in sectors where directory accuracy and content integrity are critical, such as real estate, local business listings, and professional services. Additionally, unauthorized content changes could trigger compliance issues under regulations like GDPR if personal data is involved or if misleading information affects consumers. The medium severity suggests that while the threat is not critical, it should not be ignored, especially in environments with multiple content contributors or less stringent access controls.
Mitigation Recommendations
1. Immediately review and restrict author-level and higher permissions to trusted users only, minimizing the number of accounts that can exploit this vulnerability. 2. Monitor and audit user activities related to content uploads and attachments within the plugin to detect any unauthorized changes. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the 'post_attachment_upload' function or unusual attachment behaviors. 4. If possible, apply manual input validation or sanitization on the user-controlled key parameter by customizing the plugin code or using WordPress hooks to enforce stricter checks. 5. Regularly check for official patches or updates from the plugin vendor and apply them promptly once available. 6. Educate content authors about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of account compromise. 7. Consider isolating the plugin functionality or using alternative plugins with better security track records if immediate patching is not feasible. 8. Conduct periodic security assessments focusing on WordPress plugins and user permission configurations to proactively identify similar issues.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-12833: CWE-639 Authorization Bypass Through User-Controlled Key in paoltaia GeoDirectory – WP Business Directory Plugin and Classified Listings Directory
Description
The GeoDirectory – WP Business Directory Plugin and Classified Listings Directory plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.8.139 via the 'post_attachment_upload' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with author-level access and above, to attach arbitrary image files to arbitrary places.
AI-Powered Analysis
Technical Analysis
CVE-2025-12833 is a vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting all versions up to and including 2.8.139 of the GeoDirectory – WP Business Directory Plugin and Classified Listings Directory for WordPress. The issue resides in the 'post_attachment_upload' function, where the plugin fails to properly validate a user-controlled key parameter. This lack of validation allows authenticated users with author-level access or higher to bypass intended authorization checks and attach arbitrary image files to arbitrary locations within the directory listings. This form of insecure direct object reference (IDOR) can lead to unauthorized modification of content, potentially undermining the integrity of the website's data and user trust. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based, making exploitation feasible for insiders or compromised accounts with sufficient privileges. The CVSS v3.1 score of 4.3 reflects a medium severity, primarily due to the limited impact on confidentiality and availability but a clear impact on integrity. No public exploits have been reported yet, but the vulnerability poses a risk especially in environments where multiple users have author-level permissions. The plugin is widely used in WordPress environments for business directories and classified listings, which are common in small and medium enterprises. The lack of a patch at the time of reporting necessitates immediate attention to mitigate potential exploitation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized content modifications within business directories or classified listings hosted on WordPress sites using the affected plugin. While it does not directly compromise confidentiality or availability, the integrity of the website content can be compromised, potentially damaging the organization's reputation and trustworthiness. Attackers with author-level access could insert misleading or malicious images, which might be used for phishing, misinformation, or brand damage. This is particularly concerning for organizations relying on these directories for customer engagement or lead generation. The impact is more pronounced in sectors where directory accuracy and content integrity are critical, such as real estate, local business listings, and professional services. Additionally, unauthorized content changes could trigger compliance issues under regulations like GDPR if personal data is involved or if misleading information affects consumers. The medium severity suggests that while the threat is not critical, it should not be ignored, especially in environments with multiple content contributors or less stringent access controls.
Mitigation Recommendations
1. Immediately review and restrict author-level and higher permissions to trusted users only, minimizing the number of accounts that can exploit this vulnerability. 2. Monitor and audit user activities related to content uploads and attachments within the plugin to detect any unauthorized changes. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the 'post_attachment_upload' function or unusual attachment behaviors. 4. If possible, apply manual input validation or sanitization on the user-controlled key parameter by customizing the plugin code or using WordPress hooks to enforce stricter checks. 5. Regularly check for official patches or updates from the plugin vendor and apply them promptly once available. 6. Educate content authors about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of account compromise. 7. Consider isolating the plugin functionality or using alternative plugins with better security track records if immediate patching is not feasible. 8. Conduct periodic security assessments focusing on WordPress plugins and user permission configurations to proactively identify similar issues.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-06T19:46:39.817Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691410463f7e91646d5ffa2d
Added to database: 11/12/2025, 4:42:46 AM
Last enriched: 11/19/2025, 5:47:11 AM
Last updated: 12/27/2025, 10:16:28 AM
Views: 94
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15105: Use of Hard-coded Cryptographic Key in getmaxun maxun
MediumCVE-2025-68952: CWE-94: Improper Control of Generation of Code ('Code Injection') in eigent-ai eigent
CriticalCVE-2025-68948: CWE-321: Use of Hard-coded Cryptographic Key in siyuan-note siyuan
MediumCVE-2025-68927: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in abhinavxd libredesk
HighCVE-2025-68474: CWE-787: Out-of-bounds Write in espressif esp-idf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.