Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13414: CWE-862 Missing Authorization in gwendydd Chamber Dashboard Business Directory

0
Medium
VulnerabilityCVE-2025-13414cvecve-2025-13414cwe-862
Published: Tue Nov 25 2025 (11/25/2025, 07:28:19 UTC)
Source: CVE Database V5
Vendor/Project: gwendydd
Product: Chamber Dashboard Business Directory

Description

The Chamber Dashboard Business Directory plugin for WordPress is vulnerable to unauthorized data export due to a missing capability check on the cdash_watch_for_export() function in all versions up to, and including, 3.3.11. This makes it possible for unauthenticated attackers to export business directory information, including sensitive business details.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:51:16 UTC

Technical Analysis

The Chamber Dashboard Business Directory plugin for WordPress, developed by gwendydd, suffers from a missing authorization vulnerability identified as CVE-2025-13414. The root cause is the absence of a capability check in the cdash_watch_for_export() function, which handles exporting business directory data. This flaw exists in all versions up to and including 3.3.11. Because the function does not verify whether the requester has appropriate permissions, unauthenticated attackers can invoke it remotely to export sensitive business information stored in the directory. The vulnerability is classified under CWE-862 (Missing Authorization) and has a CVSS v3.1 base score of 5.3, reflecting a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality (C:L) but not integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability exposes sensitive business data, potentially including contact details, business descriptions, and other proprietary information, which could be leveraged for competitive intelligence, phishing, or other malicious activities.

Potential Impact

The primary impact of CVE-2025-13414 is the unauthorized disclosure of sensitive business directory information. Organizations using the vulnerable plugin risk exposure of confidential business data to unauthenticated attackers, which can lead to privacy violations, reputational damage, and potential regulatory compliance issues depending on jurisdiction. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach alone can facilitate targeted phishing campaigns, social engineering, or competitive intelligence gathering. Small and medium-sized businesses listed in the directory are particularly vulnerable, as their information may be less protected elsewhere. The ease of exploitation—requiring no authentication or user interaction—means attackers can automate data harvesting at scale. This could result in large-scale data leaks affecting multiple organizations using the plugin worldwide.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately verify if they are running any version of the Chamber Dashboard Business Directory plugin up to 3.3.11 and plan to upgrade to a patched version once available. In the absence of an official patch, administrators should implement strict access controls at the web server or application firewall level to restrict access to the export functionality, ensuring only authorized users can invoke it. Reviewing and hardening WordPress user roles and capabilities related to the plugin can reduce risk. Additionally, monitoring web server logs for unusual export requests or spikes in data export activity can help detect exploitation attempts. If feasible, temporarily disabling the export feature until a fix is released is advisable. Organizations should also educate their staff about the risks of data exposure and consider encrypting sensitive business information stored in the directory to limit the impact of unauthorized exports.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T14:40:22.287Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69255e2a292ce6fc00be0642

Added to database: 11/25/2025, 7:43:38 AM

Last enriched: 2/27/2026, 9:51:16 AM

Last updated: 3/25/2026, 4:21:55 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses