Skip to main content

CVE-2025-58601: CWE-862 Missing Authorization in RadiusTheme Classified Listing

Medium
VulnerabilityCVE-2025-58601cvecve-2025-58601cwe-862
Published: Wed Sep 03 2025 (09/03/2025, 14:36:39 UTC)
Source: CVE Database V5
Vendor/Project: RadiusTheme
Product: Classified Listing

Description

Missing Authorization vulnerability in RadiusTheme Classified Listing allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Classified Listing: from n/a through 5.0.6.

AI-Powered Analysis

AILast updated: 09/03/2025, 15:20:47 UTC

Technical Analysis

CVE-2025-58601 is a medium-severity vulnerability classified under CWE-862 (Missing Authorization) affecting the RadiusTheme Classified Listing product up to version 5.0.6. This vulnerability arises due to improperly configured access control mechanisms within the Classified Listing plugin, which is commonly used for creating classified advertisement websites on WordPress platforms. The core issue is that certain functions or resources within the plugin do not enforce proper authorization checks, allowing users with limited privileges (low-level authenticated users) to perform actions or access data beyond their intended permissions. According to the CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N), the vulnerability can be exploited remotely over the network with low attack complexity and requires the attacker to have some level of privileges (authenticated user), but no user interaction is needed. The impact is limited to integrity, meaning attackers can modify or manipulate data or functionality they should not have access to, but confidentiality and availability are not directly affected. There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The vulnerability affects all versions up to 5.0.6, but specific affected versions are not detailed. The vulnerability is significant because improper authorization can lead to privilege escalation within the application context, potentially allowing attackers to alter listings, modify content, or perform unauthorized administrative actions depending on the plugin's role management. Since Classified Listing is a popular plugin for WordPress-based classified ad sites, exploitation could lead to defacement, misinformation, or manipulation of listings, impacting business operations and user trust.

Potential Impact

For European organizations using the RadiusTheme Classified Listing plugin, this vulnerability poses a risk primarily to websites that rely on this plugin for classified advertisements or marketplace functionalities. The integrity compromise could allow malicious actors to alter listings, inject fraudulent content, or manipulate pricing and contact information, potentially leading to reputational damage, loss of customer trust, and financial fraud. Since the vulnerability requires authenticated access with low privileges, insider threats or compromised user accounts could be leveraged to exploit this flaw. This is particularly concerning for small to medium enterprises (SMEs) and local marketplaces prevalent in Europe that depend on such plugins for their online presence. Additionally, organizations subject to strict data integrity and consumer protection regulations under GDPR may face compliance risks if manipulated content leads to misinformation or consumer harm. While the vulnerability does not directly impact confidentiality or availability, the integrity issues can indirectly affect business continuity and user confidence. The lack of known exploits in the wild currently reduces immediate risk, but the low complexity of exploitation and network accessibility means attackers could develop exploits rapidly once details are widely known.

Mitigation Recommendations

1. Immediate mitigation should include restricting user roles and permissions to the minimum necessary, especially limiting access to users who can interact with the Classified Listing plugin. 2. Monitor and audit user activities related to classified listings to detect unauthorized modifications or suspicious behavior. 3. Implement Web Application Firewall (WAF) rules tailored to detect and block anomalous requests targeting the Classified Listing plugin endpoints. 4. Since no official patch is currently available, consider temporarily disabling the Classified Listing plugin or replacing it with alternative solutions until a vendor patch is released. 5. Regularly check the vendor’s website and trusted vulnerability databases for updates or patches addressing CVE-2025-58601. 6. Educate users and administrators about the risks of privilege escalation and enforce strong authentication mechanisms to reduce the risk of compromised accounts. 7. Conduct penetration testing focusing on authorization controls within the plugin to identify and remediate any additional access control weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-03T09:02:27.116Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b85515ad5a09ad00f71e30

Added to database: 9/3/2025, 2:47:49 PM

Last enriched: 9/3/2025, 3:20:47 PM

Last updated: 9/3/2025, 6:02:52 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats