Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1570: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in wpwax Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings

0
High
VulnerabilityCVE-2025-1570cvecve-2025-1570cwe-640
Published: Fri Feb 28 2025 (02/28/2025, 08:23:17 UTC)
Source: CVE Database V5
Vendor/Project: wpwax
Product: Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings

Description

CVE-2025-1570 is a high-severity vulnerability in the Directorist WordPress plugin that enables unauthenticated attackers to perform privilege escalation via account takeover. The weakness lies in the plugin's password recovery mechanism, where the OTP (one-time password) used for resetting passwords can be brute forced due to insufficient controls in the functions directorist_generate_password_reset_pin_code() and reset_user_password(). This flaw allows attackers to change any user's password, including administrators, without authorization. The vulnerability affects all versions up to and including 8. 1 of the plugin. Exploitation requires no user interaction or prior authentication but has a high attack complexity due to the brute force nature. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites are at risk of full compromise if unpatched. Immediate mitigation involves applying patches when available and implementing additional controls around password reset processes.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:04:38 UTC

Technical Analysis

The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings for WordPress suffers from a critical weakness in its password recovery mechanism, identified as CVE-2025-1570 and categorized under CWE-640 (Weak Password Recovery Mechanism). The vulnerability stems from inadequate validation and protection in the functions directorist_generate_password_reset_pin_code() and reset_user_password(), which handle the generation and verification of OTPs used during password resets. Specifically, these functions do not sufficiently restrict or monitor OTP generation and verification attempts, allowing an unauthenticated attacker to brute force the OTP. Successful brute forcing enables the attacker to reset any user's password, including those with administrative privileges, effectively escalating their privileges and taking over accounts. The vulnerability affects all versions of the plugin up to and including version 8.1. The CVSS v3.1 score of 8.1 reflects the network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild, the vulnerability presents a significant risk due to the widespread use of WordPress and the plugin's functionality in business directories and classified ads, which often hold sensitive user and business data.

Potential Impact

The impact of CVE-2025-1570 is severe for organizations using the Directorist plugin on their WordPress sites. An attacker exploiting this vulnerability can gain unauthorized access to any user account by resetting passwords, including administrator accounts, leading to full site compromise. This can result in data breaches exposing sensitive business and user information, defacement or deletion of website content, insertion of malicious code or backdoors, and disruption of business operations. The ability to escalate privileges without authentication increases the risk of widespread damage and persistence within affected environments. Organizations relying on this plugin for business directories or classified ads may face reputational damage, regulatory penalties, and financial losses if exploited. The vulnerability's exploitation could also serve as a foothold for further attacks within the organization's network.

Mitigation Recommendations

To mitigate CVE-2025-1570, organizations should immediately monitor for updates or patches released by the wpwax vendor and apply them as soon as they become available. In the absence of an official patch, administrators should consider disabling the password reset functionality of the Directorist plugin or the plugin itself until a fix is applied. Implementing additional rate limiting and monitoring on password reset endpoints can help detect and prevent brute force attempts. Enforcing multi-factor authentication (MFA) for all user accounts, especially administrators, can reduce the risk of account takeover. Regularly auditing user accounts and resetting passwords proactively may limit exposure. Web application firewalls (WAFs) can be configured to detect and block suspicious password reset requests or excessive OTP verification attempts. Finally, educating users about phishing and suspicious password reset notifications can help mitigate social engineering attempts that may leverage this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-02-21T23:36:52.894Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b15b7ef31ef0b54defb

Added to database: 2/25/2026, 9:35:17 PM

Last enriched: 2/25/2026, 10:04:38 PM

Last updated: 2/26/2026, 6:14:59 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats