Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67596: Cross-Site Request Forgery (CSRF) in Strategy11 Team Business Directory

0
Medium
VulnerabilityCVE-2025-67596cvecve-2025-67596
Published: Tue Dec 09 2025 (12/09/2025, 14:14:18 UTC)
Source: CVE Database V5
Vendor/Project: Strategy11 Team
Product: Business Directory

Description

Cross-Site Request Forgery (CSRF) vulnerability in Strategy11 Team Business Directory business-directory-plugin allows Cross Site Request Forgery.This issue affects Business Directory: from n/a through <= 6.4.19.

AI-Powered Analysis

AILast updated: 12/09/2025, 14:51:03 UTC

Technical Analysis

CVE-2025-67596 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Strategy11 Team's Business Directory WordPress plugin, affecting all versions up to and including 6.4.19. CSRF vulnerabilities allow attackers to induce authenticated users to perform unwanted actions on a web application in which they are currently authenticated. In this case, an attacker could craft a malicious web page or link that, when visited by a logged-in user of a WordPress site running the vulnerable plugin, triggers unauthorized actions such as modifying directory entries, changing settings, or other administrative functions exposed by the plugin. The vulnerability arises because the plugin lacks proper anti-CSRF protections, such as nonce verification or token validation, allowing state-changing requests to be accepted without verifying the legitimacy of the request origin. No CVSS score has been assigned yet, and no public exploits are known, but the flaw is publicly disclosed and published in December 2025. The affected plugin is widely used for managing business directories on WordPress sites, which are common among small and medium enterprises (SMEs) and local business listings. The attack vector requires the victim to be authenticated and visit a malicious site or click a crafted link, making social engineering a key component of exploitation. The vulnerability impacts the integrity of the affected systems by allowing unauthorized changes, and potentially availability if destructive actions are possible. Confidentiality impact is limited unless combined with other vulnerabilities. The lack of a patch link indicates that fixes may not yet be available, emphasizing the need for immediate mitigation steps.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity of business directory data and potentially the availability of the service. Many SMEs and local businesses in Europe rely on WordPress plugins like Business Directory to manage their online presence and customer information. An attacker exploiting this CSRF flaw could manipulate directory listings, inject malicious content, or disrupt business operations by altering critical data. This can lead to reputational damage, loss of customer trust, and potential regulatory compliance issues under GDPR if personal data is affected. The ease of exploitation through social engineering increases the likelihood of successful attacks, especially in sectors with less mature cybersecurity awareness. Additionally, compromised business directories could be leveraged as a foothold for further attacks within the organization's network. The impact is more pronounced in countries with high WordPress adoption and significant numbers of SMEs, as these organizations may lack dedicated security teams to detect and respond to such threats promptly.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify if the Business Directory plugin version is 6.4.19 or earlier. Until an official patch is released, administrators should implement the following mitigations: 1) Restrict plugin access to trusted users only, minimizing the number of accounts with permissions to perform sensitive actions. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting the plugin endpoints. 3) Educate users about the risks of clicking unknown links or visiting untrusted websites while logged into administrative portals. 4) Implement additional CSRF protections at the web server or application level, such as requiring re-authentication for sensitive actions or using security plugins that enforce nonce verification. 5) Monitor logs for unusual activity related to the plugin, including unexpected POST requests or changes to directory entries. 6) Plan for rapid deployment of the official patch once released by Strategy11 Team. 7) Consider temporarily disabling the plugin if the risk outweighs business needs until a fix is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:48.325Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833ae29cea75c35ae5779

Added to database: 12/9/2025, 2:35:26 PM

Last enriched: 12/9/2025, 2:51:03 PM

Last updated: 12/10/2025, 1:03:38 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats