CVE-2025-12953: CWE-862 Missing Authorization in techlabpro1 Classified Listing – AI-Powered Classified ads & Business Directory Plugin
The Classified Listing – AI-Powered Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the "rtcl_ajax_add_listing_type", "rtcl_ajax_update_listing_type", and "rtcl_ajax_delete_listing_type" function in all versions up to, and including, 5.2.0. This makes it possible for authenticated attackers, with subscriber level access and above, to add, update, or delete listing types.
AI Analysis
Technical Summary
CVE-2025-12953 is a vulnerability identified in the 'Classified Listing – AI-Powered Classified ads & Business Directory' WordPress plugin developed by techlabpro1. The flaw stems from missing authorization (CWE-862) in three AJAX functions: 'rtcl_ajax_add_listing_type', 'rtcl_ajax_update_listing_type', and 'rtcl_ajax_delete_listing_type'. These functions lack proper capability checks, allowing any authenticated user with subscriber-level access or above to perform unauthorized modifications to listing types, including adding, updating, or deleting them. Since WordPress subscriber roles typically have minimal privileges, this vulnerability significantly elevates their ability to alter plugin data without administrative consent. The vulnerability affects all versions up to and including 5.2.0 of the plugin. The CVSS v3.1 base score is 4.3 (medium), reflecting network attack vector, low attack complexity, requiring privileges, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. The vulnerability primarily threatens data integrity by allowing unauthorized content manipulation, which could undermine the trustworthiness of classified listings or business directories hosted on affected WordPress sites.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and online marketplaces relying on WordPress with this plugin, the vulnerability poses a risk of unauthorized modification of classified listings or business directory data. This can lead to misinformation, fraudulent listings, reputational damage, and potential legal liabilities if manipulated content misleads customers or violates regulations. Although the vulnerability does not directly compromise confidentiality or availability, the integrity breach can indirectly affect business operations and user trust. Attackers with subscriber-level access could exploit this flaw to insert malicious or misleading listings, potentially facilitating scams or phishing campaigns. The impact is more pronounced in sectors where classified ads or business directories are critical, such as real estate, automotive sales, or local services. Since exploitation requires authentication, organizations with weak user registration controls or exposed subscriber accounts are at higher risk.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from techlabpro1 as soon as they become available to address the missing authorization checks. 2. Until patches are released, restrict subscriber-level user registrations or disable the plugin’s listing type management features if not essential. 3. Implement custom capability checks or use WordPress hooks to enforce stricter authorization on the affected AJAX functions. 4. Audit existing subscriber accounts and remove or upgrade unnecessary accounts to minimize the attack surface. 5. Employ web application firewalls (WAFs) with rules to detect and block unauthorized AJAX requests targeting these functions. 6. Regularly review and monitor classified listing data for unauthorized changes or anomalies. 7. Educate administrators and users about the risk of privilege escalation and encourage strong authentication practices. 8. Consider isolating critical business directory data or migrating to alternative plugins with better security track records if timely patching is not feasible.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-12953: CWE-862 Missing Authorization in techlabpro1 Classified Listing – AI-Powered Classified ads & Business Directory Plugin
Description
The Classified Listing – AI-Powered Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the "rtcl_ajax_add_listing_type", "rtcl_ajax_update_listing_type", and "rtcl_ajax_delete_listing_type" function in all versions up to, and including, 5.2.0. This makes it possible for authenticated attackers, with subscriber level access and above, to add, update, or delete listing types.
AI-Powered Analysis
Technical Analysis
CVE-2025-12953 is a vulnerability identified in the 'Classified Listing – AI-Powered Classified ads & Business Directory' WordPress plugin developed by techlabpro1. The flaw stems from missing authorization (CWE-862) in three AJAX functions: 'rtcl_ajax_add_listing_type', 'rtcl_ajax_update_listing_type', and 'rtcl_ajax_delete_listing_type'. These functions lack proper capability checks, allowing any authenticated user with subscriber-level access or above to perform unauthorized modifications to listing types, including adding, updating, or deleting them. Since WordPress subscriber roles typically have minimal privileges, this vulnerability significantly elevates their ability to alter plugin data without administrative consent. The vulnerability affects all versions up to and including 5.2.0 of the plugin. The CVSS v3.1 base score is 4.3 (medium), reflecting network attack vector, low attack complexity, requiring privileges, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. The vulnerability primarily threatens data integrity by allowing unauthorized content manipulation, which could undermine the trustworthiness of classified listings or business directories hosted on affected WordPress sites.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and online marketplaces relying on WordPress with this plugin, the vulnerability poses a risk of unauthorized modification of classified listings or business directory data. This can lead to misinformation, fraudulent listings, reputational damage, and potential legal liabilities if manipulated content misleads customers or violates regulations. Although the vulnerability does not directly compromise confidentiality or availability, the integrity breach can indirectly affect business operations and user trust. Attackers with subscriber-level access could exploit this flaw to insert malicious or misleading listings, potentially facilitating scams or phishing campaigns. The impact is more pronounced in sectors where classified ads or business directories are critical, such as real estate, automotive sales, or local services. Since exploitation requires authentication, organizations with weak user registration controls or exposed subscriber accounts are at higher risk.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from techlabpro1 as soon as they become available to address the missing authorization checks. 2. Until patches are released, restrict subscriber-level user registrations or disable the plugin’s listing type management features if not essential. 3. Implement custom capability checks or use WordPress hooks to enforce stricter authorization on the affected AJAX functions. 4. Audit existing subscriber accounts and remove or upgrade unnecessary accounts to minimize the attack surface. 5. Employ web application firewalls (WAFs) with rules to detect and block unauthorized AJAX requests targeting these functions. 6. Regularly review and monitor classified listing data for unauthorized changes or anomalies. 7. Educate administrators and users about the risk of privilege escalation and encourage strong authentication practices. 8. Consider isolating critical business directory data or migrating to alternative plugins with better security track records if timely patching is not feasible.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-10T13:49:05.597Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69131c131c700d145d0c4cf1
Added to database: 11/11/2025, 11:20:51 AM
Last enriched: 11/11/2025, 11:35:45 AM
Last updated: 11/12/2025, 4:04:39 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54983: CWE-772 Missing Release of Resource after Effective Lifetime in Zscaler Zscaler Client Connector
MediumResearchers Detect Malicious npm Package Targeting GitHub-Owned Repositories
MediumCVE-2025-43205: An app may be able to bypass ASLR in Apple watchOS
UnknownAdobe Patches 29 Vulnerabilities
MediumCVE-2025-41116: CWE-653 in Grafana Labs Grafana Databricks Datasource Plugin
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.