Vulnerabilites related to wpwax - Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings
CVE-2025-2224 (GCVE-0-2025-2224)
Vulnerability from cvelistv5
Published
2025-03-25 05:22
Modified
2025-03-31 18:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the 'parse_query' function in all versions up to, and including, 8.2. This makes it possible for unauthenticated attackers to update the post_status of any post to 'publish'.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
wpwax | Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings |
Version: * ≤ 8.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2224", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T18:18:19.412775Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T18:18:28.816Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings", "vendor": "wpwax", "versions": [ { "lessThanOrEqual": "8.2", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Michael Mazzolini" } ], "descriptions": [ { "lang": "en", "value": "The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the \u0027parse_query\u0027 function in all versions up to, and including, 8.2. This makes it possible for unauthenticated attackers to update the post_status of any post to \u0027publish\u0027." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T05:22:48.169Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/684e6a97-b884-4d25-99f1-81c2a43f1239?source=cve" }, { "url": "https://plugins.trac.wordpress.org/browser/directorist/trunk/includes/classes/class-add-listing.php#L912" }, { "url": "https://plugins.trac.wordpress.org/browser/directorist/trunk/includes/classes/class-add-listing.php#L942" }, { "url": "https://plugins.trac.wordpress.org/browser/directorist/trunk/includes/classes/class-add-listing.php#L960" }, { "url": "https://plugins.trac.wordpress.org/changeset/3260639/" } ], "timeline": [ { "lang": "en", "time": "2025-03-24T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "Directorist \u003c= 8.2 - Missing Authorization to Unauthenticated Arbitrary Post Publishing" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2025-2224", "datePublished": "2025-03-25T05:22:48.169Z", "dateReserved": "2025-03-11T17:29:40.677Z", "dateUpdated": "2025-03-31T18:18:28.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-12041 (GCVE-0-2024-12041)
Vulnerability from cvelistv5
Published
2025-02-01 05:30
Modified
2025-02-03 16:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-359 - Exposure of Private Personal Information to an Unauthorized Actor
Summary
The Directorist: AI-Powered WordPress Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 8.0.12 via the /wp-json/directorist/v1/users/ endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including including usernames, email addresses, names, and more information about users.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
wpwax | Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings |
Version: * ≤ 8.0.12 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-12041", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-03T16:24:04.327332Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-03T16:38:07.063Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings", "vendor": "wpwax", "versions": [ { "lessThanOrEqual": "8.0.12", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Khayal Farzaliyev" } ], "descriptions": [ { "lang": "en", "value": "The Directorist: AI-Powered WordPress Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 8.0.12 via the /wp-json/directorist/v1/users/ endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including including usernames, email addresses, names, and more information about users." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "CWE-359 Exposure of Private Personal Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-01T05:30:36.527Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0d9817ff-ca56-4941-97bc-f26defe7ddd5?source=cve" }, { "url": "https://plugins.trac.wordpress.org/changeset/3208874/directorist/tags/8.0.9/includes/rest-api/Version1/class-users-controller.php" }, { "url": "https://plugins.trac.wordpress.org/changeset/3231156/directorist/tags/8.1/includes/rest-api/Version1/class-users-controller.php" } ], "timeline": [ { "lang": "en", "time": "2025-01-31T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "Directorist \u2013 AI-Powered WordPress Business Directory Plugin with Classified Ads Listings \u003c= 8.0.12 - Unauthenticated User Information Exposure" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-12041", "datePublished": "2025-02-01T05:30:36.527Z", "dateReserved": "2024-12-02T17:37:29.493Z", "dateUpdated": "2025-02-03T16:38:07.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-1570 (GCVE-0-2025-1570)
Vulnerability from cvelistv5
Published
2025-02-28 08:23
Modified
2025-02-28 14:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-640 - Weak Password Recovery Mechanism for Forgotten Password
Summary
The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 8.1. This is due to the directorist_generate_password_reset_pin_code() and reset_user_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
wpwax | Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings |
Version: * ≤ 8.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1570", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-28T14:48:38.283513Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-28T14:48:50.580Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings", "vendor": "wpwax", "versions": [ { "lessThanOrEqual": "8.1", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "wesley" } ], "descriptions": [ { "lang": "en", "value": "The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 8.1. This is due to the directorist_generate_password_reset_pin_code() and reset_user_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-640", "description": "CWE-640 Weak Password Recovery Mechanism for Forgotten Password", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-28T08:23:17.826Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/853562ed-7f2e-453c-b3d0-67c90bd0231f?source=cve" }, { "url": "https://plugins.trac.wordpress.org/changeset/3246340/directorist" } ], "timeline": [ { "lang": "en", "time": "2025-02-21T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2025-02-27T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings \u003c= 8.1 - Privilege Escalation and Account Takeover via Weak OTP" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2025-1570", "datePublished": "2025-02-28T08:23:17.826Z", "dateReserved": "2025-02-21T23:36:52.894Z", "dateUpdated": "2025-02-28T14:48:50.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }