Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12833: CWE-639 Authorization Bypass Through User-Controlled Key in paoltaia GeoDirectory – WP Business Directory Plugin and Classified Listings Directory

0
Medium
VulnerabilityCVE-2025-12833cvecve-2025-12833cwe-639
Published: Wed Nov 12 2025 (11/12/2025, 04:29:09 UTC)
Source: CVE Database V5
Vendor/Project: paoltaia
Product: GeoDirectory – WP Business Directory Plugin and Classified Listings Directory

Description

The GeoDirectory – WP Business Directory Plugin and Classified Listings Directory plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.8.139 via the 'post_attachment_upload' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with author-level access and above, to attach arbitrary image files to arbitrary places.

AI-Powered Analysis

AILast updated: 11/19/2025, 05:47:11 UTC

Technical Analysis

CVE-2025-12833 is a vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting all versions up to and including 2.8.139 of the GeoDirectory – WP Business Directory Plugin and Classified Listings Directory for WordPress. The issue resides in the 'post_attachment_upload' function, where the plugin fails to properly validate a user-controlled key parameter. This lack of validation allows authenticated users with author-level access or higher to bypass intended authorization checks and attach arbitrary image files to arbitrary locations within the directory listings. This form of insecure direct object reference (IDOR) can lead to unauthorized modification of content, potentially undermining the integrity of the website's data and user trust. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based, making exploitation feasible for insiders or compromised accounts with sufficient privileges. The CVSS v3.1 score of 4.3 reflects a medium severity, primarily due to the limited impact on confidentiality and availability but a clear impact on integrity. No public exploits have been reported yet, but the vulnerability poses a risk especially in environments where multiple users have author-level permissions. The plugin is widely used in WordPress environments for business directories and classified listings, which are common in small and medium enterprises. The lack of a patch at the time of reporting necessitates immediate attention to mitigate potential exploitation.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized content modifications within business directories or classified listings hosted on WordPress sites using the affected plugin. While it does not directly compromise confidentiality or availability, the integrity of the website content can be compromised, potentially damaging the organization's reputation and trustworthiness. Attackers with author-level access could insert misleading or malicious images, which might be used for phishing, misinformation, or brand damage. This is particularly concerning for organizations relying on these directories for customer engagement or lead generation. The impact is more pronounced in sectors where directory accuracy and content integrity are critical, such as real estate, local business listings, and professional services. Additionally, unauthorized content changes could trigger compliance issues under regulations like GDPR if personal data is involved or if misleading information affects consumers. The medium severity suggests that while the threat is not critical, it should not be ignored, especially in environments with multiple content contributors or less stringent access controls.

Mitigation Recommendations

1. Immediately review and restrict author-level and higher permissions to trusted users only, minimizing the number of accounts that can exploit this vulnerability. 2. Monitor and audit user activities related to content uploads and attachments within the plugin to detect any unauthorized changes. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the 'post_attachment_upload' function or unusual attachment behaviors. 4. If possible, apply manual input validation or sanitization on the user-controlled key parameter by customizing the plugin code or using WordPress hooks to enforce stricter checks. 5. Regularly check for official patches or updates from the plugin vendor and apply them promptly once available. 6. Educate content authors about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of account compromise. 7. Consider isolating the plugin functionality or using alternative plugins with better security track records if immediate patching is not feasible. 8. Conduct periodic security assessments focusing on WordPress plugins and user permission configurations to proactively identify similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-06T19:46:39.817Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691410463f7e91646d5ffa2d

Added to database: 11/12/2025, 4:42:46 AM

Last enriched: 11/19/2025, 5:47:11 AM

Last updated: 12/27/2025, 10:16:28 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats