Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64630: Missing Authorization in Strategy11 Team Business Directory

0
Unknown
VulnerabilityCVE-2025-64630cvecve-2025-64630
Published: Tue Dec 16 2025 (12/16/2025, 08:12:50 UTC)
Source: CVE Database V5
Vendor/Project: Strategy11 Team
Product: Business Directory

Description

Missing Authorization vulnerability in Strategy11 Team Business Directory business-directory-plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Business Directory: from n/a through <= 6.4.19.

AI-Powered Analysis

AILast updated: 12/16/2025, 08:37:59 UTC

Technical Analysis

CVE-2025-64630 identifies a missing authorization vulnerability in the Strategy11 Team's Business Directory plugin for WordPress, affecting all versions up to and including 6.4.19. The vulnerability arises from incorrectly configured access control security levels, which means that certain functions or data within the plugin can be accessed or manipulated without proper authorization checks. This flaw can allow an attacker to perform unauthorized actions such as viewing, modifying, or deleting business directory entries or configurations that should be restricted. The vulnerability does not require prior authentication, increasing its risk profile, and no user interaction is needed beyond sending crafted requests to the affected endpoints. Although no exploits have been reported in the wild yet, the nature of the vulnerability suggests it could be leveraged for privilege escalation or data tampering within affected WordPress sites. The plugin is commonly used to manage business listings, so exploitation could lead to misinformation, data integrity issues, or exposure of sensitive business information. The lack of a CVSS score indicates that the vulnerability is newly published and pending detailed scoring, but the technical details and impact suggest a serious security concern. The vulnerability was reserved in early November 2025 and published mid-December 2025, indicating recent discovery and disclosure. No official patches or mitigation links are currently provided, so organizations must proactively audit and restrict access controls within the plugin configuration until vendor fixes are released.

Potential Impact

For European organizations, the impact of CVE-2025-64630 can be significant, especially for those relying on the Strategy11 Business Directory plugin to manage critical business listings or customer-facing directories. Unauthorized access could lead to data breaches exposing sensitive business information, manipulation of directory content causing reputational damage, or disruption of business operations if directory data is corrupted or deleted. This could affect sectors such as retail, services, and local government entities that use business directories for public information dissemination. The vulnerability undermines confidentiality and integrity, potentially allowing attackers to impersonate legitimate business entries or inject malicious content. Given the plugin’s integration with WordPress, a widely used CMS in Europe, the attack surface is broad. The absence of authentication requirements for exploitation increases the risk of automated or opportunistic attacks. Additionally, compromised business directories could be used as a foothold for further attacks within organizational networks. The lack of known exploits currently limits immediate widespread impact, but the vulnerability’s characteristics warrant urgent attention to prevent future exploitation.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Strategy11 Business Directory plugin and verify the version in use. Until an official patch is released, administrators should manually review and tighten access control settings within the plugin, ensuring that sensitive functions and data are restricted to authorized users only. Implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the plugin endpoints can provide temporary protection. Monitoring logs for unusual access patterns or unauthorized changes in the directory data is critical. Organizations should also consider disabling or removing the plugin if it is not essential to reduce the attack surface. Keeping WordPress core and all plugins updated is essential, and once the vendor releases a patch, it should be applied promptly. Additionally, organizations should educate their IT and security teams about this vulnerability to ensure rapid response and incident handling if exploitation attempts are detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-06T13:11:11.068Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6941174f594e45819d70c59b

Added to database: 12/16/2025, 8:24:47 AM

Last enriched: 12/16/2025, 8:37:59 AM

Last updated: 12/18/2025, 1:31:00 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats