Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63047: Missing Authorization in CridioStudio ListingPro

0
Medium
VulnerabilityCVE-2025-63047cvecve-2025-63047
Published: Tue Dec 09 2025 (12/09/2025, 14:52:31 UTC)
Source: CVE Database V5
Vendor/Project: CridioStudio
Product: ListingPro

Description

Missing Authorization vulnerability in CridioStudio ListingPro listingpro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ListingPro: from n/a through <= 2.9.9.

AI-Powered Analysis

AILast updated: 12/09/2025, 15:37:59 UTC

Technical Analysis

CVE-2025-63047 identifies a Missing Authorization vulnerability in the ListingPro plugin developed by CridioStudio, affecting all versions up to and including 2.9.9. The vulnerability stems from incorrectly configured access control security levels, which means that certain functions or data that should be restricted to authorized users can be accessed without proper permission checks. This type of vulnerability typically allows attackers to bypass authentication or authorization mechanisms, potentially leading to unauthorized viewing, modification, or deletion of sensitive data or administrative functions. ListingPro is a WordPress plugin widely used for creating directory and listing websites, which often contain sensitive business or personal information. The absence of a CVSS score indicates that the vulnerability has not yet been fully assessed in terms of impact and exploitability, and no patches or exploits are currently publicly known. However, the nature of missing authorization issues generally implies a significant risk because they can be exploited remotely without authentication or user interaction. The vulnerability was reserved in October 2025 and published in December 2025, indicating recent discovery and disclosure. Organizations using ListingPro should consider this a critical security issue due to the potential for unauthorized access to protected resources within their websites.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, especially for those relying on ListingPro for business directories, event listings, or service portals. Unauthorized access could lead to exposure of sensitive customer or business data, manipulation of listings, or unauthorized administrative actions, undermining trust and potentially violating data protection regulations such as GDPR. The availability of directory services could also be affected if attackers modify or delete listings, impacting business operations and user experience. Given the plugin’s integration with WordPress, a widely used CMS in Europe, the attack surface is significant. Organizations in sectors such as tourism, local business services, real estate, and event management are particularly at risk. Additionally, unauthorized access could facilitate further attacks, such as phishing or social engineering, leveraging the compromised listings or data. The absence of known exploits provides a window for proactive mitigation, but the risk remains high due to the ease of exploitation and the critical nature of access control failures.

Mitigation Recommendations

1. Immediately audit all installations of ListingPro to identify affected versions (<= 2.9.9). 2. Monitor official CridioStudio channels and Patchstack for security patches or updates addressing CVE-2025-63047 and apply them promptly once available. 3. Until patches are released, implement strict web application firewall (WAF) rules to restrict access to sensitive ListingPro endpoints and functions, especially those requiring authorization. 4. Review and tighten WordPress user roles and permissions to minimize exposure of administrative or sensitive functions. 5. Conduct regular security assessments and penetration tests focusing on access control mechanisms within ListingPro. 6. Enable detailed logging and monitoring of ListingPro-related activities to detect unauthorized access attempts early. 7. Educate site administrators on the risks of missing authorization vulnerabilities and best practices for plugin management and updates. 8. Consider temporary disabling or replacing ListingPro with alternative directory solutions if immediate patching is not feasible and the risk is unacceptable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:26:26.919Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69383ac929cea75c35b76f93

Added to database: 12/9/2025, 3:05:45 PM

Last enriched: 12/9/2025, 3:37:59 PM

Last updated: 12/10/2025, 11:02:01 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats