Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58667: CWE-862 Missing Authorization in CridioStudio ListingPro Reviews

0
Medium
VulnerabilityCVE-2025-58667cvecve-2025-58667cwe-862
Published: Mon Sep 22 2025 (09/22/2025, 18:22:57 UTC)
Source: CVE Database V5
Vendor/Project: CridioStudio
Product: ListingPro Reviews

Description

Missing Authorization vulnerability in CridioStudio ListingPro Reviews allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ListingPro Reviews: from n/a through 1.6.

AI-Powered Analysis

AILast updated: 09/30/2025, 01:18:06 UTC

Technical Analysis

CVE-2025-58667 is a Missing Authorization vulnerability (CWE-862) identified in the ListingPro Reviews component developed by CridioStudio. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges (PR:L - privileges required: low) to perform actions or access resources beyond their authorization scope without requiring user interaction (UI:N). The vulnerability affects ListingPro Reviews versions up to 1.6, though exact affected versions are unspecified (noted as 'n/a'). The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), privileges required low (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). This indicates that an attacker with limited privileges, such as a registered user, can exploit the vulnerability remotely to perform unauthorized actions that may alter data integrity and availability of the ListingPro Reviews system. Since ListingPro is a WordPress-based directory and review management plugin widely used for business listings, this vulnerability could allow malicious actors to manipulate review data, potentially altering or deleting reviews, or otherwise impacting the trustworthiness and availability of the review system. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that the vulnerability is newly disclosed and may require immediate attention from administrators. The root cause is an access control misconfiguration, meaning that the system fails to properly verify whether a user is authorized to perform certain actions within the ListingPro Reviews module, leading to privilege escalation or unauthorized data manipulation risks.

Potential Impact

For European organizations using ListingPro Reviews, this vulnerability poses a risk to the integrity and availability of their online business listings and review data. Manipulation or deletion of reviews can damage business reputations, mislead customers, and reduce trust in the platform. This can have direct financial impacts, especially for SMEs relying on positive reviews for customer acquisition. Additionally, availability impacts may disrupt service continuity, affecting user experience and potentially leading to loss of revenue. Since the vulnerability requires only low privileges and no user interaction, it can be exploited remotely by authenticated users, increasing the risk of insider threats or compromised accounts being leveraged. Given the GDPR environment in Europe, unauthorized data manipulation could also raise compliance concerns if personal data or user-generated content is affected, potentially leading to regulatory scrutiny or penalties. The absence of known exploits currently provides a window for proactive mitigation, but organizations should act swiftly to prevent exploitation once public awareness grows.

Mitigation Recommendations

1. Immediate review and tightening of access control policies within the ListingPro Reviews plugin configuration to ensure that only authorized roles can perform sensitive actions such as modifying or deleting reviews. 2. Restrict user roles and permissions in WordPress to the minimum necessary, avoiding granting unnecessary privileges to users who do not require them. 3. Monitor logs for unusual activity related to review modifications or deletions to detect potential exploitation attempts early. 4. Implement multi-factor authentication (MFA) for all users with any level of privilege to reduce risk from compromised accounts. 5. Regularly update the ListingPro Reviews plugin and WordPress core as soon as patches become available from CridioStudio or trusted security sources. 6. Consider deploying a Web Application Firewall (WAF) with custom rules to detect and block suspicious requests targeting review modification endpoints. 7. Conduct internal security audits and penetration tests focusing on access control mechanisms in the ListingPro environment to identify and remediate any other potential weaknesses. 8. Educate administrators and users on the importance of strong credentials and monitoring for suspicious activity related to reviews.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-03T09:03:35.443Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d194d1a6a0abbafb7a3cc0

Added to database: 9/22/2025, 6:26:25 PM

Last enriched: 9/30/2025, 1:18:06 AM

Last updated: 10/7/2025, 1:52:02 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats