CVE-2025-0763

4.3 MEDIUM

📋 TL;DR

This vulnerability in the Ultimate Classified Listings WordPress plugin allows authenticated attackers with Subscriber-level access or higher to modify plugin custom fields without proper authorization. It affects all WordPress sites using this plugin up to version 1.6. The issue stems from missing capability checks in the save_custom_fields function.

💻 Affected Systems

Products:
  • Ultimate Classified Listings WordPress Plugin
Versions: All versions up to and including 1.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. Attackers need at least Subscriber-level authenticated access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify critical plugin settings, potentially altering classified listing functionality, injecting malicious content, or disrupting business operations.

🟠

Likely Case

Malicious users could tamper with classified listing fields, modify pricing, change contact information, or alter other plugin-specific data.

🟢

If Mitigated

With proper user role management and monitoring, impact would be limited to authorized changes only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of plugin endpoints. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.6

Vendor Advisory: https://plugins.trac.wordpress.org/browser/ultimate-classified-listings

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Ultimate Classified Listings. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

WordPress

Disable the vulnerable plugin until patched

wp plugin deactivate ultimate-classified-listings

User Role Restriction

WordPress CLI

Temporarily restrict Subscriber and Contributor roles from accessing the site

wp user list --role=subscriber --field=ID | xargs wp user set-role {ID} none

🧯 If You Can't Patch

  • Remove the Ultimate Classified Listings plugin entirely and use alternative classified listing solutions.
  • Implement strict user role management and monitor all authenticated user activity for suspicious plugin modifications.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Ultimate Classified Listings. If version is 1.6 or lower, you are vulnerable.

Check Version:

wp plugin get ultimate-classified-listings --field=version

Verify Fix Applied:

After updating, verify plugin version is higher than 1.6 in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=save_custom_fields
  • Multiple failed authentication attempts followed by successful Subscriber logins
  • Unexpected modifications to wp_options table with ultimate_classified_ prefix

Network Indicators:

  • HTTP POST requests containing ultimate-classified-listings parameters from non-admin users
  • Unusual traffic patterns to plugin-specific admin endpoints

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data CONTAINS "save_custom_fields") AND user_role="subscriber"

🔗 References

📤 Share & Export