Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64219: Missing Authorization in Strategy11 Team Business Directory

0
Medium
VulnerabilityCVE-2025-64219cvecve-2025-64219
Published: Wed Oct 29 2025 (10/29/2025, 08:38:09 UTC)
Source: CVE Database V5
Vendor/Project: Strategy11 Team
Product: Business Directory

Description

Missing Authorization vulnerability in Strategy11 Team Business Directory business-directory-plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Business Directory: from n/a through <= 6.4.18.

AI-Powered Analysis

AILast updated: 11/13/2025, 13:04:41 UTC

Technical Analysis

CVE-2025-64219 identifies a missing authorization vulnerability in the Strategy11 Team's Business Directory WordPress plugin, affecting versions up to 6.4.18. The vulnerability stems from incorrectly configured access control security levels, which allow users with limited privileges (PR:L) to perform actions beyond their authorization scope. Specifically, the plugin fails to properly enforce authorization checks on certain functions or endpoints, enabling privilege escalation or unauthorized modifications to business directory data. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) indicates that the attack can be executed remotely over the network with low attack complexity, requires some privileges but no user interaction, and impacts integrity without affecting confidentiality or availability. Although no exploits are currently known in the wild, the vulnerability presents a risk of unauthorized data manipulation, potentially undermining the trustworthiness of business listings or related information. The plugin is commonly used in WordPress environments to manage business directories, making it a relevant target for attackers seeking to alter data or disrupt services. The lack of vendor patches at the time of publication necessitates immediate attention to access control configurations and monitoring for suspicious activities.

Potential Impact

For European organizations, the impact primarily concerns the integrity of business directory data managed via the Strategy11 Business Directory plugin. Unauthorized modifications could lead to misinformation, reputational damage, or operational disruptions if business listings are altered maliciously. While confidentiality and availability are not directly affected, the integrity compromise could indirectly affect business decisions or customer trust. Organizations relying on this plugin for public-facing directories or internal business listings are at risk, especially if attackers escalate privileges to manipulate data. The medium severity rating suggests a moderate risk level, but the ease of remote exploitation and lack of user interaction increase the urgency for mitigation. Additionally, sectors with high reliance on accurate business data, such as retail, services, and local government directories, could face more pronounced consequences.

Mitigation Recommendations

1. Immediately audit and review access control configurations within the Business Directory plugin to ensure that only authorized roles have permissions to modify directory data. 2. Restrict plugin administrative and editing capabilities strictly to trusted users with appropriate roles. 3. Monitor logs for unusual modification activities or privilege escalations related to the plugin. 4. Apply any vendor-released patches or updates addressing this vulnerability as soon as they become available. 5. If patches are delayed, consider temporarily disabling the plugin or limiting its functionality to reduce exposure. 6. Implement web application firewalls (WAF) with rules to detect and block suspicious requests targeting the plugin endpoints. 7. Educate administrators on the risks of privilege misuse and enforce strong role-based access controls within WordPress environments. 8. Regularly back up business directory data to enable recovery in case of unauthorized changes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-10-29T03:08:02.189Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6901d65e86d093201c2b6188

Added to database: 10/29/2025, 8:54:54 AM

Last enriched: 11/13/2025, 1:04:41 PM

Last updated: 12/14/2025, 9:59:58 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats