Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60103: CWE-862 Missing Authorization in CridioStudio ListingPro

0
Medium
VulnerabilityCVE-2025-60103cvecve-2025-60103cwe-862
Published: Fri Sep 26 2025 (09/26/2025, 08:31:23 UTC)
Source: CVE Database V5
Vendor/Project: CridioStudio
Product: ListingPro

Description

Missing Authorization vulnerability in CridioStudio ListingPro allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ListingPro: from n/a through 2.9.8.

AI-Powered Analysis

AILast updated: 10/04/2025, 00:37:13 UTC

Technical Analysis

CVE-2025-60103 is a Missing Authorization vulnerability (CWE-862) identified in CridioStudio's ListingPro product, affecting versions up to 2.9.8. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges (requiring low privilege, PR:L) to perform actions or access resources beyond their authorization scope without requiring user interaction (UI:N). The vulnerability is remotely exploitable over the network (AV:N) and does not impact confidentiality (C:N) but can lead to integrity (I:L) and availability (A:L) issues. Specifically, an attacker with some level of authenticated access can exploit the missing authorization checks to manipulate or disrupt ListingPro's functionalities or data, potentially modifying listings or causing service degradation. The CVSS v3.1 base score is 5.4, categorizing it as a medium severity vulnerability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's root cause is the absence or misconfiguration of authorization logic, which is critical in multi-user web applications like ListingPro that manage listings and user-generated content. Attackers exploiting this flaw could escalate their privileges within the application or disrupt normal operations, impacting the integrity and availability of the service.

Potential Impact

For European organizations using ListingPro, this vulnerability poses a moderate risk. ListingPro is a directory and listing management platform often used by businesses to manage local or specialized listings. Exploitation could allow unauthorized modification or deletion of listings, impacting business operations, customer trust, and data integrity. The availability impact could disrupt service continuity, affecting customer access to listings and potentially leading to revenue loss or reputational damage. Since the vulnerability requires low privilege authentication, insider threats or compromised user accounts could be leveraged to exploit this flaw. European organizations relying on ListingPro for critical business functions or customer engagement may face operational disruptions and data integrity issues. Furthermore, regulatory compliance under GDPR mandates protection of data integrity and availability; exploitation could lead to compliance violations if personal or business data is affected. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

Organizations should implement strict access control reviews and ensure proper authorization checks are enforced throughout ListingPro's functionalities. Immediate mitigation includes auditing user roles and permissions to minimize privilege exposure, especially for accounts with modification capabilities. Network-level controls such as IP whitelisting and multi-factor authentication (MFA) for user accounts can reduce the risk of unauthorized access. Monitoring and logging user activities related to listing modifications can help detect suspicious behavior early. Since no official patches are currently available, organizations should engage with CridioStudio for timelines on patch releases and consider temporary compensating controls such as web application firewalls (WAF) with custom rules to block unauthorized access patterns. Additionally, restricting access to ListingPro administration interfaces to trusted networks or VPNs can reduce exposure. Regular backups of listing data will aid in recovery if integrity or availability is compromised. Finally, educating users about phishing and credential security can reduce the risk of account compromise, which is a prerequisite for exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:20:16.564Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d72b6379aa5c9d0854f518

Added to database: 9/27/2025, 12:10:11 AM

Last enriched: 10/4/2025, 12:37:13 AM

Last updated: 11/9/2025, 10:48:28 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats