CVE-2025-64376: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in CridioStudio ListingPro
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CridioStudio ListingPro listingpro allows Reflected XSS.This issue affects ListingPro: from n/a through < 2.9.10.
AI Analysis
Technical Summary
CVE-2025-64376 is a reflected Cross-site Scripting (XSS) vulnerability found in the ListingPro plugin developed by CridioStudio, affecting all versions prior to 2.9.10. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows attackers to inject malicious JavaScript code that is reflected back to users. When a victim interacts with a crafted URL or input, the malicious script executes in their browser context, potentially leading to session hijacking, credential theft, defacement, or redirection to malicious sites. The CVSS 3.1 score of 7.1 indicates a high-severity issue with network attack vector, low attack complexity, no privileges required, but user interaction necessary. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Confidentiality, integrity, and availability impacts are all rated low to medium but combined justify a high severity. No known exploits are currently reported in the wild, but public disclosure increases risk. ListingPro is a popular WordPress directory plugin used by businesses to list services and locations, making it a valuable target for attackers aiming to compromise business websites or their users. The vulnerability was reserved in late October 2025 and published in December 2025, with no patch links currently provided, indicating that organizations must monitor for updates or apply mitigations proactively.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites using the ListingPro plugin, especially those operating local business directories or service listings. Exploitation can lead to theft of user credentials, session tokens, and personal data, undermining user trust and potentially violating GDPR requirements. Attackers could also deface websites or redirect users to phishing or malware sites, damaging brand reputation and causing operational disruptions. Since ListingPro is widely used in small to medium enterprises and local business platforms, the impact could cascade to customers and partners relying on these services. The reflected XSS nature means attacks often come via phishing or malicious links, increasing the risk to end-users and employees. Additionally, compromised sites could be leveraged as part of larger attack campaigns or to distribute malware, amplifying the threat landscape in Europe. The lack of an immediate patch increases exposure time, necessitating urgent mitigation efforts.
Mitigation Recommendations
Organizations should immediately verify their use of the ListingPro plugin and upgrade to version 2.9.10 or later once available. Until a patch is released, apply Web Application Firewall (WAF) rules to detect and block typical XSS payloads targeting ListingPro endpoints. Implement strict input validation and output encoding on all user-supplied data, especially in URL parameters and form inputs processed by ListingPro. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of any successful injection. Educate users and administrators about the risks of clicking untrusted links and monitor web logs for suspicious activity indicative of attempted exploitation. Regularly audit and update all WordPress plugins and themes to minimize exposure to known vulnerabilities. Consider isolating critical business directories behind additional authentication or access controls to reduce attack surface. Engage with CridioStudio support channels for timely patch information and guidance.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-64376: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in CridioStudio ListingPro
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CridioStudio ListingPro listingpro allows Reflected XSS.This issue affects ListingPro: from n/a through < 2.9.10.
AI-Powered Analysis
Technical Analysis
CVE-2025-64376 is a reflected Cross-site Scripting (XSS) vulnerability found in the ListingPro plugin developed by CridioStudio, affecting all versions prior to 2.9.10. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows attackers to inject malicious JavaScript code that is reflected back to users. When a victim interacts with a crafted URL or input, the malicious script executes in their browser context, potentially leading to session hijacking, credential theft, defacement, or redirection to malicious sites. The CVSS 3.1 score of 7.1 indicates a high-severity issue with network attack vector, low attack complexity, no privileges required, but user interaction necessary. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Confidentiality, integrity, and availability impacts are all rated low to medium but combined justify a high severity. No known exploits are currently reported in the wild, but public disclosure increases risk. ListingPro is a popular WordPress directory plugin used by businesses to list services and locations, making it a valuable target for attackers aiming to compromise business websites or their users. The vulnerability was reserved in late October 2025 and published in December 2025, with no patch links currently provided, indicating that organizations must monitor for updates or apply mitigations proactively.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites using the ListingPro plugin, especially those operating local business directories or service listings. Exploitation can lead to theft of user credentials, session tokens, and personal data, undermining user trust and potentially violating GDPR requirements. Attackers could also deface websites or redirect users to phishing or malware sites, damaging brand reputation and causing operational disruptions. Since ListingPro is widely used in small to medium enterprises and local business platforms, the impact could cascade to customers and partners relying on these services. The reflected XSS nature means attacks often come via phishing or malicious links, increasing the risk to end-users and employees. Additionally, compromised sites could be leveraged as part of larger attack campaigns or to distribute malware, amplifying the threat landscape in Europe. The lack of an immediate patch increases exposure time, necessitating urgent mitigation efforts.
Mitigation Recommendations
Organizations should immediately verify their use of the ListingPro plugin and upgrade to version 2.9.10 or later once available. Until a patch is released, apply Web Application Firewall (WAF) rules to detect and block typical XSS payloads targeting ListingPro endpoints. Implement strict input validation and output encoding on all user-supplied data, especially in URL parameters and form inputs processed by ListingPro. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of any successful injection. Educate users and administrators about the risks of clicking untrusted links and monitor web logs for suspicious activity indicative of attempted exploitation. Regularly audit and update all WordPress plugins and themes to minimize exposure to known vulnerabilities. Consider isolating critical business directories behind additional authentication or access controls to reduce attack surface. Engage with CridioStudio support channels for timely patch information and guidance.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-31T11:23:19.708Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b0564eb3efac36700b32
Added to database: 12/18/2025, 7:42:14 AM
Last enriched: 1/21/2026, 12:09:58 AM
Last updated: 2/7/2026, 11:36:19 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.