Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64378: Missing Authorization in CridioStudio ListingPro

0
High
VulnerabilityCVE-2025-64378cvecve-2025-64378
Published: Thu Dec 18 2025 (12/18/2025, 07:22:16 UTC)
Source: CVE Database V5
Vendor/Project: CridioStudio
Product: ListingPro

Description

Missing Authorization vulnerability in CridioStudio ListingPro listingpro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ListingPro: from n/a through < 2.9.10.

AI-Powered Analysis

AILast updated: 12/18/2025, 08:00:44 UTC

Technical Analysis

CVE-2025-64378 identifies a Missing Authorization vulnerability in CridioStudio's ListingPro plugin, a popular WordPress directory and listing management tool. The vulnerability arises from incorrectly configured access control security levels, which fail to properly restrict user permissions. This misconfiguration allows attackers to bypass authorization checks and perform actions that should be restricted, such as viewing, modifying, or deleting listings without proper privileges. The affected versions include all ListingPro releases prior to 2.9.10, with no specific version range detailed beyond that. The vulnerability was reserved on October 31, 2025, and published on December 18, 2025. No CVSS score has been assigned, and no public exploits are known at this time. The flaw could be exploited remotely if the attacker can reach the vulnerable ListingPro instance, typically hosted on WordPress sites. Since ListingPro is used to manage business listings, unauthorized access could lead to data leakage, unauthorized content changes, or disruption of directory services. The lack of proper authorization checks represents a critical security lapse that undermines the integrity and confidentiality of the application’s data. The vulnerability does not require user interaction but does require the attacker to have network access to the affected system. Given the plugin’s role in managing business-critical information, exploitation could have significant operational and reputational impacts.

Potential Impact

For European organizations, the impact of CVE-2025-64378 could be substantial, especially for those relying on ListingPro for business directories, local listings, or service marketplaces. Unauthorized access could lead to exposure of sensitive business information, unauthorized modification or deletion of listings, and potential disruption of services offered through these platforms. This could damage customer trust, lead to regulatory compliance issues under GDPR due to unauthorized data exposure, and cause financial losses from operational downtime or reputational harm. Organizations in sectors such as retail, hospitality, and local services that use ListingPro to manage customer-facing directories are particularly at risk. The vulnerability’s exploitation could also facilitate further attacks by providing attackers with footholds or sensitive data. Since ListingPro is a WordPress plugin, the widespread use of WordPress in Europe increases the potential attack surface. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure.

Mitigation Recommendations

1. Immediately update ListingPro to version 2.9.10 or later once the patch is available from CridioStudio to ensure the authorization flaw is fixed. 2. Until patching is possible, restrict access to the ListingPro administration and management interfaces using network-level controls such as IP whitelisting or VPN access to limit exposure. 3. Review and harden WordPress user roles and permissions to ensure that only trusted users have administrative or listing management privileges. 4. Implement web application firewalls (WAF) with rules designed to detect and block unauthorized access attempts targeting ListingPro endpoints. 5. Conduct regular audits of listing data and logs to detect unauthorized changes or access patterns indicative of exploitation attempts. 6. Educate site administrators on the importance of timely plugin updates and secure configuration practices. 7. Monitor threat intelligence feeds and vendor advisories for any emerging exploit information related to this vulnerability. 8. Consider isolating ListingPro installations on segmented network zones to reduce lateral movement risk if compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-31T11:23:19.708Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0564eb3efac36700b38

Added to database: 12/18/2025, 7:42:14 AM

Last enriched: 12/18/2025, 8:00:44 AM

Last updated: 12/19/2025, 6:37:50 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats