Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67966: Incorrect Privilege Assignment in e-plugins Lawyer Directory

0
High
VulnerabilityCVE-2025-67966cvecve-2025-67966
Published: Thu Jan 22 2026 (01/22/2026, 16:51:58 UTC)
Source: CVE Database V5
Vendor/Project: e-plugins
Product: Lawyer Directory

Description

Incorrect Privilege Assignment vulnerability in e-plugins Lawyer Directory lawyer-directory allows Privilege Escalation.This issue affects Lawyer Directory: from n/a through <= 1.3.3.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:39:58 UTC

Technical Analysis

CVE-2025-67966 is an Incorrect Privilege Assignment vulnerability found in the e-plugins Lawyer Directory plugin, versions up to 1.3.3. This vulnerability allows an attacker with limited privileges to escalate their privileges within the system, potentially gaining administrative or equivalent access. The root cause is improper assignment or enforcement of user privileges within the plugin's access control mechanisms. The CVSS 3.1 base score is 8.8, reflecting a high severity due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), requirement for privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this flaw could allow an attacker to manipulate sensitive data, disrupt service availability, or take full control of the affected WordPress installation. Although no public exploits are currently known, the vulnerability's characteristics make it a significant risk, especially for organizations relying on this plugin for managing lawyer directories. The lack of available patches increases the urgency for monitoring vendor updates and implementing interim controls.

Potential Impact

For European organizations, particularly law firms, legal directories, and service providers using the e-plugins Lawyer Directory plugin, this vulnerability poses a critical risk. Exploitation could lead to unauthorized access to sensitive client and case information, violating data protection regulations such as GDPR. The integrity of legal data could be compromised, undermining trust and potentially causing legal liabilities. Availability impacts could disrupt business operations, affecting client services and reputation. Given the plugin’s role in managing lawyer information, attackers could manipulate listings or inject malicious content, further damaging organizational credibility. The vulnerability's network accessibility and lack of required user interaction increase the likelihood of exploitation, making it a significant threat to European legal sector entities and their clients.

Mitigation Recommendations

1. Monitor e-plugins vendor channels closely for official patches addressing CVE-2025-67966 and apply them immediately upon release. 2. Conduct a thorough audit of user roles and permissions within the Lawyer Directory plugin and WordPress environment to ensure least privilege principles are enforced. 3. Temporarily restrict access to the Lawyer Directory plugin administration interfaces to trusted administrators only. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious privilege escalation attempts targeting the plugin. 5. Regularly review logs for unusual privilege changes or access patterns related to the plugin. 6. Consider isolating the affected plugin in a staging environment for testing before applying updates in production. 7. Educate administrators about the risks of privilege escalation and the importance of timely patching. 8. If feasible, disable or remove the Lawyer Directory plugin until a secure version is available to mitigate risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:23.852Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259174623b1157c7faeca

Added to database: 1/22/2026, 5:06:31 PM

Last enriched: 1/30/2026, 8:39:58 AM

Last updated: 2/7/2026, 12:49:21 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats