Unauthorized Data Modification and PHP Object Injection in uListing Plugin for WordPress
CVE-2025-1657

8.8HIGH

What is CVE-2025-1657?

The uListing plugin for WordPress is susceptible to vulnerabilities that allow authenticated users with subscriber-level access and above to alter post meta data. This occurs due to a lack of capability checks on the stm_listing_ajax AJAX action, enabling PHP Object Injection attacks, where malicious PHP objects can be injected and unserialized. Affected versions include all releases up to and including 2.1.7, making it essential for users to update their plugins promptly to mitigate risks associated with unauthorized data manipulation.

Affected Version(s)

Directory Listings WordPress plugin – uListing * <= 2.1.7

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nguyen Tan Phat
.