CVE-2025-60103: CWE-862 Missing Authorization in CridioStudio ListingPro
Missing Authorization vulnerability in CridioStudio ListingPro allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ListingPro: from n/a through 2.9.8.
AI Analysis
Technical Summary
CVE-2025-60103 is a Missing Authorization vulnerability (CWE-862) identified in CridioStudio's ListingPro product, affecting versions up to 2.9.8. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges (requiring low privilege, PR:L) to perform actions or access resources beyond their authorization scope without requiring user interaction (UI:N). The vulnerability is remotely exploitable over the network (AV:N) and does not impact confidentiality (C:N) but can lead to integrity (I:L) and availability (A:L) issues. Specifically, an attacker with some level of authenticated access can exploit the missing authorization checks to manipulate or disrupt ListingPro's functionalities or data, potentially modifying listings or causing service degradation. The CVSS v3.1 base score is 5.4, categorizing it as a medium severity vulnerability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's root cause is the absence or misconfiguration of authorization logic, which is critical in multi-user web applications like ListingPro that manage listings and user-generated content. Attackers exploiting this flaw could escalate their privileges within the application or disrupt normal operations, impacting the integrity and availability of the service.
Potential Impact
For European organizations using ListingPro, this vulnerability poses a moderate risk. ListingPro is a directory and listing management platform often used by businesses to manage local or specialized listings. Exploitation could allow unauthorized modification or deletion of listings, impacting business operations, customer trust, and data integrity. The availability impact could disrupt service continuity, affecting customer access to listings and potentially leading to revenue loss or reputational damage. Since the vulnerability requires low privilege authentication, insider threats or compromised user accounts could be leveraged to exploit this flaw. European organizations relying on ListingPro for critical business functions or customer engagement may face operational disruptions and data integrity issues. Furthermore, regulatory compliance under GDPR mandates protection of data integrity and availability; exploitation could lead to compliance violations if personal or business data is affected. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.
Mitigation Recommendations
Organizations should implement strict access control reviews and ensure proper authorization checks are enforced throughout ListingPro's functionalities. Immediate mitigation includes auditing user roles and permissions to minimize privilege exposure, especially for accounts with modification capabilities. Network-level controls such as IP whitelisting and multi-factor authentication (MFA) for user accounts can reduce the risk of unauthorized access. Monitoring and logging user activities related to listing modifications can help detect suspicious behavior early. Since no official patches are currently available, organizations should engage with CridioStudio for timelines on patch releases and consider temporary compensating controls such as web application firewalls (WAF) with custom rules to block unauthorized access patterns. Additionally, restricting access to ListingPro administration interfaces to trusted networks or VPNs can reduce exposure. Regular backups of listing data will aid in recovery if integrity or availability is compromised. Finally, educating users about phishing and credential security can reduce the risk of account compromise, which is a prerequisite for exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-60103: CWE-862 Missing Authorization in CridioStudio ListingPro
Description
Missing Authorization vulnerability in CridioStudio ListingPro allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ListingPro: from n/a through 2.9.8.
AI-Powered Analysis
Technical Analysis
CVE-2025-60103 is a Missing Authorization vulnerability (CWE-862) identified in CridioStudio's ListingPro product, affecting versions up to 2.9.8. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges (requiring low privilege, PR:L) to perform actions or access resources beyond their authorization scope without requiring user interaction (UI:N). The vulnerability is remotely exploitable over the network (AV:N) and does not impact confidentiality (C:N) but can lead to integrity (I:L) and availability (A:L) issues. Specifically, an attacker with some level of authenticated access can exploit the missing authorization checks to manipulate or disrupt ListingPro's functionalities or data, potentially modifying listings or causing service degradation. The CVSS v3.1 base score is 5.4, categorizing it as a medium severity vulnerability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's root cause is the absence or misconfiguration of authorization logic, which is critical in multi-user web applications like ListingPro that manage listings and user-generated content. Attackers exploiting this flaw could escalate their privileges within the application or disrupt normal operations, impacting the integrity and availability of the service.
Potential Impact
For European organizations using ListingPro, this vulnerability poses a moderate risk. ListingPro is a directory and listing management platform often used by businesses to manage local or specialized listings. Exploitation could allow unauthorized modification or deletion of listings, impacting business operations, customer trust, and data integrity. The availability impact could disrupt service continuity, affecting customer access to listings and potentially leading to revenue loss or reputational damage. Since the vulnerability requires low privilege authentication, insider threats or compromised user accounts could be leveraged to exploit this flaw. European organizations relying on ListingPro for critical business functions or customer engagement may face operational disruptions and data integrity issues. Furthermore, regulatory compliance under GDPR mandates protection of data integrity and availability; exploitation could lead to compliance violations if personal or business data is affected. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.
Mitigation Recommendations
Organizations should implement strict access control reviews and ensure proper authorization checks are enforced throughout ListingPro's functionalities. Immediate mitigation includes auditing user roles and permissions to minimize privilege exposure, especially for accounts with modification capabilities. Network-level controls such as IP whitelisting and multi-factor authentication (MFA) for user accounts can reduce the risk of unauthorized access. Monitoring and logging user activities related to listing modifications can help detect suspicious behavior early. Since no official patches are currently available, organizations should engage with CridioStudio for timelines on patch releases and consider temporary compensating controls such as web application firewalls (WAF) with custom rules to block unauthorized access patterns. Additionally, restricting access to ListingPro administration interfaces to trusted networks or VPNs can reduce exposure. Regular backups of listing data will aid in recovery if integrity or availability is compromised. Finally, educating users about phishing and credential security can reduce the risk of account compromise, which is a prerequisite for exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:20:16.564Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d72b6379aa5c9d0854f518
Added to database: 9/27/2025, 12:10:11 AM
Last enriched: 10/4/2025, 12:37:13 AM
Last updated: 11/9/2025, 10:48:28 AM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12918: Improper Control of Resource Identifiers in yungifez Skuul School Management System
LowCVE-2025-12917: Denial of Service in TOZED ZLT T10
MediumCVE-2025-12916: Command Injection in Sangfor Operation and Maintenance Security Management System
MediumCVE-2025-12915: File Inclusion in 70mai X200
HighCVE-2025-12914: SQL Injection in aaPanel BaoTa
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.