Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68069: Missing Authorization in wpWax Directorist

0
High
VulnerabilityCVE-2025-68069cvecve-2025-68069
Published: Fri Feb 20 2026 (02/20/2026, 15:46:38 UTC)
Source: CVE Database V5
Vendor/Project: wpWax
Product: Directorist

Description

CVE-2025-68069 is a missing authorization vulnerability in the wpWax Directorist plugin versions up to 8. 5. 10. This flaw allows attackers to bypass access control mechanisms due to incorrectly configured security levels, potentially enabling unauthorized actions within the affected WordPress plugin. No known exploits are currently reported in the wild. The vulnerability impacts the confidentiality and integrity of data managed by Directorist, and exploitation does not require user interaction but may depend on the attacker’s ability to access the plugin interface. There is no CVSS score assigned yet, but the issue poses a high risk due to the nature of missing authorization controls. Organizations using wpWax Directorist should prioritize patching once available and implement strict access controls to mitigate potential exploitation. Countries with significant WordPress usage and active Directorist deployments are at higher risk. Immediate mitigation steps include restricting plugin access and monitoring for suspicious activity until an official patch is released.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:20:45 UTC

Technical Analysis

CVE-2025-68069 identifies a missing authorization vulnerability in the wpWax Directorist WordPress plugin, affecting all versions up to and including 8.5.10. The vulnerability arises from incorrectly configured access control security levels within the plugin, which fail to properly verify whether a user has the necessary permissions to perform certain actions. This missing authorization can allow an attacker to bypass intended restrictions, potentially enabling unauthorized access to sensitive functions or data managed by the Directorist plugin. Directorist is a popular directory listing plugin used on WordPress sites to manage business listings, events, or other directory content. The lack of proper authorization checks means that an attacker with access to the WordPress environment could exploit this flaw to manipulate listings, alter data, or perform administrative actions without proper privileges. Although no public exploits have been reported yet, the vulnerability is significant because it undermines the core security principle of access control. The issue was reserved in December 2025 and published in February 2026, but no patch links are currently available, indicating that users must rely on interim mitigations. The absence of a CVSS score requires an assessment based on the vulnerability’s characteristics: missing authorization typically leads to high severity due to the potential for privilege escalation and data compromise. Exploitation does not require user interaction but does require some level of access to the WordPress backend or plugin interface. This vulnerability highlights the importance of rigorous access control validation in WordPress plugins, especially those managing sensitive or business-critical data.

Potential Impact

The missing authorization vulnerability in wpWax Directorist can have severe consequences for organizations using this plugin. Unauthorized users could gain elevated privileges, allowing them to modify, delete, or create directory listings without permission, potentially leading to data integrity issues and loss of trust in the affected website. Confidential information stored or displayed via the plugin could be exposed or manipulated, impacting privacy and compliance requirements. The integrity of business listings or event data could be compromised, which may affect customer experience and business operations. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the WordPress environment, potentially escalating to full site compromise. Since Directorist is often used by businesses, community portals, and event organizers, the impact extends to reputational damage and financial loss. The lack of a patch increases the window of exposure, making proactive mitigation critical. Organizations worldwide relying on WordPress and Directorist face risks of unauthorized data manipulation and potential service disruption.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations to reduce risk. First, restrict access to the WordPress admin dashboard and Directorist plugin settings to only trusted administrators using strong authentication methods such as multi-factor authentication (MFA). Review and tighten user roles and permissions to ensure that only necessary users have access to directory management features. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting Directorist endpoints. Monitor logs for unusual activity related to directory listings or plugin functions. Disable or limit plugin features that require authorization checks if feasible. Keep WordPress core and all other plugins updated to reduce the attack surface. Once a patch is available from wpWax, apply it immediately. Additionally, consider isolating the WordPress environment using containerization or network segmentation to limit potential lateral movement if exploitation occurs. Regularly back up website data to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:01:24.070Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9efbe58cf853bab8562

Added to database: 2/20/2026, 8:54:07 PM

Last enriched: 2/20/2026, 9:20:45 PM

Last updated: 2/21/2026, 6:23:49 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats