Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23548: Missing Authorization in designinvento DirectoryPress

0
Unknown
VulnerabilityCVE-2026-23548cvecve-2026-23548
Published: Thu Feb 19 2026 (02/19/2026, 08:26:49 UTC)
Source: CVE Database V5
Vendor/Project: designinvento
Product: DirectoryPress

Description

Missing Authorization vulnerability in designinvento DirectoryPress directorypress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects DirectoryPress: from n/a through <= 3.6.25.

AI-Powered Analysis

AILast updated: 02/19/2026, 10:12:56 UTC

Technical Analysis

CVE-2026-23548 identifies a missing authorization vulnerability in the DirectoryPress plugin developed by designinvento, affecting all versions up to and including 3.6.25. The core issue stems from incorrectly configured access control security levels within the plugin, which can allow unauthorized users to perform actions or access resources that should be restricted. This vulnerability arises when the plugin fails to properly verify user permissions before granting access to sensitive operations or data, effectively bypassing intended security controls. Although no known exploits have been reported in the wild, the flaw represents a significant risk because missing authorization is a fundamental security failure that can lead to unauthorized data disclosure, modification, or administrative actions. DirectoryPress is a WordPress plugin commonly used to create directory or listing websites, meaning that compromised installations could expose sensitive directory data or allow attackers to manipulate listings or user information. The vulnerability was reserved in January 2026 and published in February 2026, but no CVSS score has been assigned yet. The lack of a patch link suggests that a fix may not have been released at the time of this report, emphasizing the need for immediate attention from administrators. The vulnerability does not require user interaction or authentication bypass beyond the missing authorization itself, making exploitation potentially straightforward for attackers with access to the affected system. Overall, this vulnerability undermines the integrity and confidentiality of DirectoryPress installations and poses a medium to high risk depending on the deployment context.

Potential Impact

For European organizations, the missing authorization vulnerability in DirectoryPress could lead to unauthorized access to sensitive directory data, manipulation of listings, or unauthorized administrative actions. This can result in data breaches, reputational damage, and potential regulatory non-compliance, especially under GDPR requirements concerning personal data protection. Organizations using DirectoryPress for business directories, membership listings, or service catalogs may face operational disruptions or data integrity issues. The impact is heightened in sectors where directory data is critical, such as local government services, professional associations, or commercial marketplaces. Additionally, unauthorized changes could facilitate further attacks, including phishing or fraud, by altering directory information. The absence of known exploits currently limits immediate widespread impact, but the vulnerability's nature means it could be exploited by attackers with minimal effort once discovered. European entities relying on WordPress ecosystems should consider this vulnerability a significant risk due to the widespread use of such plugins and the potential for cascading effects on data confidentiality and integrity.

Mitigation Recommendations

Administrators should immediately audit their DirectoryPress plugin versions and confirm if they are running version 3.6.25 or earlier. Until an official patch is released, organizations should implement compensating controls such as restricting access to the WordPress admin panel and DirectoryPress functionalities to trusted IP addresses or VPNs. Review and tighten user roles and permissions within WordPress to minimize exposure. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting DirectoryPress endpoints. Monitor logs for unusual access patterns or unauthorized actions related to directory entries. Engage with the vendor or security community to track patch availability and apply updates promptly once released. Additionally, conduct penetration testing focused on access control mechanisms in DirectoryPress to identify and remediate any other potential weaknesses. Educate site administrators on the risks of missing authorization vulnerabilities and the importance of least privilege principles. Finally, maintain regular backups of directory data to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-14T08:36:07.869Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6996d0366aea4a407a4bd9fc

Added to database: 2/19/2026, 8:56:22 AM

Last enriched: 2/19/2026, 10:12:56 AM

Last updated: 2/21/2026, 12:16:59 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats