CVE-2025-67596: Cross-Site Request Forgery (CSRF) in Strategy11 Team Business Directory
Cross-Site Request Forgery (CSRF) vulnerability in Strategy11 Team Business Directory business-directory-plugin allows Cross Site Request Forgery.This issue affects Business Directory: from n/a through <= 6.4.19.
AI Analysis
Technical Summary
CVE-2025-67596 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Strategy11 Team's Business Directory WordPress plugin, affecting all versions up to and including 6.4.19. CSRF vulnerabilities allow attackers to induce authenticated users to perform unwanted actions on a web application in which they are currently authenticated. In this case, an attacker could craft a malicious web page or link that, when visited by a logged-in user of a WordPress site running the vulnerable plugin, triggers unauthorized actions such as modifying directory entries, changing settings, or other administrative functions exposed by the plugin. The vulnerability arises because the plugin lacks proper anti-CSRF protections, such as nonce verification or token validation, allowing state-changing requests to be accepted without verifying the legitimacy of the request origin. No CVSS score has been assigned yet, and no public exploits are known, but the flaw is publicly disclosed and published in December 2025. The affected plugin is widely used for managing business directories on WordPress sites, which are common among small and medium enterprises (SMEs) and local business listings. The attack vector requires the victim to be authenticated and visit a malicious site or click a crafted link, making social engineering a key component of exploitation. The vulnerability impacts the integrity of the affected systems by allowing unauthorized changes, and potentially availability if destructive actions are possible. Confidentiality impact is limited unless combined with other vulnerabilities. The lack of a patch link indicates that fixes may not yet be available, emphasizing the need for immediate mitigation steps.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity of business directory data and potentially the availability of the service. Many SMEs and local businesses in Europe rely on WordPress plugins like Business Directory to manage their online presence and customer information. An attacker exploiting this CSRF flaw could manipulate directory listings, inject malicious content, or disrupt business operations by altering critical data. This can lead to reputational damage, loss of customer trust, and potential regulatory compliance issues under GDPR if personal data is affected. The ease of exploitation through social engineering increases the likelihood of successful attacks, especially in sectors with less mature cybersecurity awareness. Additionally, compromised business directories could be leveraged as a foothold for further attacks within the organization's network. The impact is more pronounced in countries with high WordPress adoption and significant numbers of SMEs, as these organizations may lack dedicated security teams to detect and respond to such threats promptly.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify if the Business Directory plugin version is 6.4.19 or earlier. Until an official patch is released, administrators should implement the following mitigations: 1) Restrict plugin access to trusted users only, minimizing the number of accounts with permissions to perform sensitive actions. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting the plugin endpoints. 3) Educate users about the risks of clicking unknown links or visiting untrusted websites while logged into administrative portals. 4) Implement additional CSRF protections at the web server or application level, such as requiring re-authentication for sensitive actions or using security plugins that enforce nonce verification. 5) Monitor logs for unusual activity related to the plugin, including unexpected POST requests or changes to directory entries. 6) Plan for rapid deployment of the official patch once released by Strategy11 Team. 7) Consider temporarily disabling the plugin if the risk outweighs business needs until a fix is available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-67596: Cross-Site Request Forgery (CSRF) in Strategy11 Team Business Directory
Description
Cross-Site Request Forgery (CSRF) vulnerability in Strategy11 Team Business Directory business-directory-plugin allows Cross Site Request Forgery.This issue affects Business Directory: from n/a through <= 6.4.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-67596 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Strategy11 Team's Business Directory WordPress plugin, affecting all versions up to and including 6.4.19. CSRF vulnerabilities allow attackers to induce authenticated users to perform unwanted actions on a web application in which they are currently authenticated. In this case, an attacker could craft a malicious web page or link that, when visited by a logged-in user of a WordPress site running the vulnerable plugin, triggers unauthorized actions such as modifying directory entries, changing settings, or other administrative functions exposed by the plugin. The vulnerability arises because the plugin lacks proper anti-CSRF protections, such as nonce verification or token validation, allowing state-changing requests to be accepted without verifying the legitimacy of the request origin. No CVSS score has been assigned yet, and no public exploits are known, but the flaw is publicly disclosed and published in December 2025. The affected plugin is widely used for managing business directories on WordPress sites, which are common among small and medium enterprises (SMEs) and local business listings. The attack vector requires the victim to be authenticated and visit a malicious site or click a crafted link, making social engineering a key component of exploitation. The vulnerability impacts the integrity of the affected systems by allowing unauthorized changes, and potentially availability if destructive actions are possible. Confidentiality impact is limited unless combined with other vulnerabilities. The lack of a patch link indicates that fixes may not yet be available, emphasizing the need for immediate mitigation steps.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity of business directory data and potentially the availability of the service. Many SMEs and local businesses in Europe rely on WordPress plugins like Business Directory to manage their online presence and customer information. An attacker exploiting this CSRF flaw could manipulate directory listings, inject malicious content, or disrupt business operations by altering critical data. This can lead to reputational damage, loss of customer trust, and potential regulatory compliance issues under GDPR if personal data is affected. The ease of exploitation through social engineering increases the likelihood of successful attacks, especially in sectors with less mature cybersecurity awareness. Additionally, compromised business directories could be leveraged as a foothold for further attacks within the organization's network. The impact is more pronounced in countries with high WordPress adoption and significant numbers of SMEs, as these organizations may lack dedicated security teams to detect and respond to such threats promptly.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify if the Business Directory plugin version is 6.4.19 or earlier. Until an official patch is released, administrators should implement the following mitigations: 1) Restrict plugin access to trusted users only, minimizing the number of accounts with permissions to perform sensitive actions. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting the plugin endpoints. 3) Educate users about the risks of clicking unknown links or visiting untrusted websites while logged into administrative portals. 4) Implement additional CSRF protections at the web server or application level, such as requiring re-authentication for sensitive actions or using security plugins that enforce nonce verification. 5) Monitor logs for unusual activity related to the plugin, including unexpected POST requests or changes to directory entries. 6) Plan for rapid deployment of the official patch once released by Strategy11 Team. 7) Consider temporarily disabling the plugin if the risk outweighs business needs until a fix is available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-09T12:21:48.325Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693833ae29cea75c35ae5779
Added to database: 12/9/2025, 2:35:26 PM
Last enriched: 12/9/2025, 2:51:03 PM
Last updated: 12/10/2025, 1:03:38 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13184: CWE-306 Missing Authentication for Critical Function in Toto Link X5000R's (AX1800 router)
UnknownCVE-2025-13953: CWE-290 Authentication Bypass by Spoofing in GTT Sistema de Información Tributario
CriticalCVE-2025-41358: CWE-639 Authorization Bypass Through User-Controlled Key in CronosWeb i2A CronosWeb
HighCVE-2025-41732: CWE-121 Stack-based Buffer Overflow in WAGO Indsutrial-Managed-Switches
HighCVE-2025-41730: CWE-121 Stack-based Buffer Overflow in WAGO Indsutrial-Managed-Switches
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.