Privilege Escalation Vulnerability in Directorist Plugin for WordPress
CVE-2025-1570

9.8CRITICAL

Key Information:

Summary

The Directorist: AI-Powered Business Directory Plugin for WordPress is susceptible to a privilege escalation vulnerability allowing unauthorized users to change any user's password, including that of administrators. This flaw arises from inadequate controls within the directorist_generate_password_reset_pin_code() and reset_user_password() functions, permitting unauthenticated attackers to perform brute force attacks to generate a one-time password (OTP) for password resets. Without proper authorization checks, this vulnerability enables potential account takeovers, posing a serious risk to affected installations.

Affected Version(s)

Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings * <= 8.1

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

wesley
.