CVE-2025-58667: CWE-862 Missing Authorization in CridioStudio ListingPro Reviews
Missing Authorization vulnerability in CridioStudio ListingPro Reviews allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ListingPro Reviews: from n/a through 1.6.
AI Analysis
Technical Summary
CVE-2025-58667 is a Missing Authorization vulnerability (CWE-862) identified in the ListingPro Reviews component developed by CridioStudio. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges (PR:L - privileges required: low) to perform actions or access resources beyond their authorization scope without requiring user interaction (UI:N). The vulnerability affects ListingPro Reviews versions up to 1.6, though exact affected versions are unspecified (noted as 'n/a'). The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), privileges required low (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). This indicates that an attacker with limited privileges, such as a registered user, can exploit the vulnerability remotely to perform unauthorized actions that may alter data integrity and availability of the ListingPro Reviews system. Since ListingPro is a WordPress-based directory and review management plugin widely used for business listings, this vulnerability could allow malicious actors to manipulate review data, potentially altering or deleting reviews, or otherwise impacting the trustworthiness and availability of the review system. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that the vulnerability is newly disclosed and may require immediate attention from administrators. The root cause is an access control misconfiguration, meaning that the system fails to properly verify whether a user is authorized to perform certain actions within the ListingPro Reviews module, leading to privilege escalation or unauthorized data manipulation risks.
Potential Impact
For European organizations using ListingPro Reviews, this vulnerability poses a risk to the integrity and availability of their online business listings and review data. Manipulation or deletion of reviews can damage business reputations, mislead customers, and reduce trust in the platform. This can have direct financial impacts, especially for SMEs relying on positive reviews for customer acquisition. Additionally, availability impacts may disrupt service continuity, affecting user experience and potentially leading to loss of revenue. Since the vulnerability requires only low privileges and no user interaction, it can be exploited remotely by authenticated users, increasing the risk of insider threats or compromised accounts being leveraged. Given the GDPR environment in Europe, unauthorized data manipulation could also raise compliance concerns if personal data or user-generated content is affected, potentially leading to regulatory scrutiny or penalties. The absence of known exploits currently provides a window for proactive mitigation, but organizations should act swiftly to prevent exploitation once public awareness grows.
Mitigation Recommendations
1. Immediate review and tightening of access control policies within the ListingPro Reviews plugin configuration to ensure that only authorized roles can perform sensitive actions such as modifying or deleting reviews. 2. Restrict user roles and permissions in WordPress to the minimum necessary, avoiding granting unnecessary privileges to users who do not require them. 3. Monitor logs for unusual activity related to review modifications or deletions to detect potential exploitation attempts early. 4. Implement multi-factor authentication (MFA) for all users with any level of privilege to reduce risk from compromised accounts. 5. Regularly update the ListingPro Reviews plugin and WordPress core as soon as patches become available from CridioStudio or trusted security sources. 6. Consider deploying a Web Application Firewall (WAF) with custom rules to detect and block suspicious requests targeting review modification endpoints. 7. Conduct internal security audits and penetration tests focusing on access control mechanisms in the ListingPro environment to identify and remediate any other potential weaknesses. 8. Educate administrators and users on the importance of strong credentials and monitoring for suspicious activity related to reviews.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-58667: CWE-862 Missing Authorization in CridioStudio ListingPro Reviews
Description
Missing Authorization vulnerability in CridioStudio ListingPro Reviews allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ListingPro Reviews: from n/a through 1.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-58667 is a Missing Authorization vulnerability (CWE-862) identified in the ListingPro Reviews component developed by CridioStudio. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges (PR:L - privileges required: low) to perform actions or access resources beyond their authorization scope without requiring user interaction (UI:N). The vulnerability affects ListingPro Reviews versions up to 1.6, though exact affected versions are unspecified (noted as 'n/a'). The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), privileges required low (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). This indicates that an attacker with limited privileges, such as a registered user, can exploit the vulnerability remotely to perform unauthorized actions that may alter data integrity and availability of the ListingPro Reviews system. Since ListingPro is a WordPress-based directory and review management plugin widely used for business listings, this vulnerability could allow malicious actors to manipulate review data, potentially altering or deleting reviews, or otherwise impacting the trustworthiness and availability of the review system. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that the vulnerability is newly disclosed and may require immediate attention from administrators. The root cause is an access control misconfiguration, meaning that the system fails to properly verify whether a user is authorized to perform certain actions within the ListingPro Reviews module, leading to privilege escalation or unauthorized data manipulation risks.
Potential Impact
For European organizations using ListingPro Reviews, this vulnerability poses a risk to the integrity and availability of their online business listings and review data. Manipulation or deletion of reviews can damage business reputations, mislead customers, and reduce trust in the platform. This can have direct financial impacts, especially for SMEs relying on positive reviews for customer acquisition. Additionally, availability impacts may disrupt service continuity, affecting user experience and potentially leading to loss of revenue. Since the vulnerability requires only low privileges and no user interaction, it can be exploited remotely by authenticated users, increasing the risk of insider threats or compromised accounts being leveraged. Given the GDPR environment in Europe, unauthorized data manipulation could also raise compliance concerns if personal data or user-generated content is affected, potentially leading to regulatory scrutiny or penalties. The absence of known exploits currently provides a window for proactive mitigation, but organizations should act swiftly to prevent exploitation once public awareness grows.
Mitigation Recommendations
1. Immediate review and tightening of access control policies within the ListingPro Reviews plugin configuration to ensure that only authorized roles can perform sensitive actions such as modifying or deleting reviews. 2. Restrict user roles and permissions in WordPress to the minimum necessary, avoiding granting unnecessary privileges to users who do not require them. 3. Monitor logs for unusual activity related to review modifications or deletions to detect potential exploitation attempts early. 4. Implement multi-factor authentication (MFA) for all users with any level of privilege to reduce risk from compromised accounts. 5. Regularly update the ListingPro Reviews plugin and WordPress core as soon as patches become available from CridioStudio or trusted security sources. 6. Consider deploying a Web Application Firewall (WAF) with custom rules to detect and block suspicious requests targeting review modification endpoints. 7. Conduct internal security audits and penetration tests focusing on access control mechanisms in the ListingPro environment to identify and remediate any other potential weaknesses. 8. Educate administrators and users on the importance of strong credentials and monitoring for suspicious activity related to reviews.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-03T09:03:35.443Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d194d1a6a0abbafb7a3cc0
Added to database: 9/22/2025, 6:26:25 PM
Last enriched: 9/30/2025, 1:18:06 AM
Last updated: 10/7/2025, 1:52:02 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.