CVE-2025-12577
BaseFortify
Publication date: 2025-12-06
Last updated on: 2025-12-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| passionui | listar_directory_listing_and_classifieds_wordpress_plugin | 3.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
An attacker with at least Subscriber-level access can exploit this vulnerability to modify listing details in the plugin. This unauthorized modification could lead to misinformation, defacement, or manipulation of directory listings, potentially damaging the integrity and trustworthiness of the website's content.
Can you explain this vulnerability to me?
This vulnerability exists in the Listar β Directory Listing & Classifieds WordPress Plugin up to version 3.0.0. It is caused by a missing capability check on the '/wp-json/listar/v1/place/save' REST API endpoint, which allows authenticated users with Subscriber-level access or higher to modify listing details without proper authorization.