Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63049: Missing Authorization in CridioStudio ListingPro Lead Form

0
Medium
VulnerabilityCVE-2025-63049cvecve-2025-63049
Published: Tue Dec 09 2025 (12/09/2025, 14:52:31 UTC)
Source: CVE Database V5
Vendor/Project: CridioStudio
Product: ListingPro Lead Form

Description

Missing Authorization vulnerability in CridioStudio ListingPro Lead Form listingpro-lead-form allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects ListingPro Lead Form: from n/a through <= 1.0.2.

AI-Powered Analysis

AILast updated: 01/20/2026, 23:26:59 UTC

Technical Analysis

CVE-2025-63049 is a vulnerability identified in the ListingPro Lead Form plugin developed by CridioStudio, affecting versions up to 1.0.2. The core issue is a missing authorization check, meaning that certain functionalities within the lead form can be accessed without proper verification of user permissions. This flaw allows unauthenticated remote attackers to access data or functions that should be restricted by Access Control Lists (ACLs). The vulnerability is classified under the category of 'Missing Authorization,' which typically leads to unauthorized data exposure or functionality misuse. The CVSS 3.1 base score is 5.3, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality impact (C:L) but no impact on integrity (I:N) or availability (A:N). The vulnerability was published on December 9, 2025, with no known exploits in the wild at the time of reporting. The absence of patches at the time of disclosure suggests that organizations should prioritize monitoring and interim access control measures. The vulnerability could lead to unauthorized access to lead form submissions or related sensitive data, potentially exposing personal or business information collected via the plugin. Given the plugin’s use in WordPress environments, the attack surface includes websites that rely on ListingPro for lead generation, particularly in small and medium enterprises. The lack of authentication and user interaction requirements makes exploitation straightforward for remote attackers scanning for vulnerable endpoints.

Potential Impact

For European organizations, the primary impact of CVE-2025-63049 is the potential unauthorized disclosure of lead form data, which may include personal identifiable information (PII) or business-sensitive information. This could lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. The vulnerability does not affect system integrity or availability, so direct disruption or data manipulation is unlikely. However, unauthorized data access can facilitate further attacks such as phishing, social engineering, or targeted fraud. Organizations relying on ListingPro Lead Form for customer acquisition or communication may suffer loss of trust if data leakage occurs. The medium severity score indicates a moderate risk, but the ease of exploitation without authentication increases the urgency for mitigation. European businesses in sectors like real estate, professional services, and local commerce, which commonly use lead generation plugins, are particularly at risk. Additionally, the exposure of lead data could have downstream effects on partners and clients, amplifying the impact. The lack of known exploits in the wild currently reduces immediate risk, but proactive measures are essential to prevent future exploitation.

Mitigation Recommendations

1. Monitor official CridioStudio channels and security advisories for the release of a patch addressing CVE-2025-63049 and apply it immediately upon availability. 2. Until a patch is available, implement web application firewall (WAF) rules to restrict access to the lead form endpoints, allowing only trusted IP addresses or authenticated users where feasible. 3. Conduct a thorough audit of access controls on the ListingPro Lead Form functionality to identify and close any unauthorized access paths. 4. Employ logging and monitoring solutions to detect unusual or unauthorized access attempts to the lead form, enabling rapid incident response. 5. Review and minimize the amount of sensitive data collected via the lead form to reduce exposure in case of unauthorized access. 6. Educate website administrators and developers about the importance of enforcing ACLs and regularly testing for authorization weaknesses. 7. Consider temporary disabling the lead form functionality if it is not critical to business operations until the vulnerability is remediated. 8. Perform penetration testing focused on authorization controls to uncover similar issues in other plugins or custom code.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:26:26.919Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69383ac929cea75c35b76f99

Added to database: 12/9/2025, 3:05:45 PM

Last enriched: 1/20/2026, 11:26:59 PM

Last updated: 2/7/2026, 12:23:11 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats