CVE-2025-12577

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to modify listing details without proper authorization. It affects all WordPress sites using the Listar plugin up to version 3.0.0. Attackers can exploit this to alter directory listings and classified ads.

💻 Affected Systems

Products:
  • Listar – Directory Listing & Classifieds WordPress Plugin
Versions: All versions up to and including 3.0.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the Listar plugin installed and at least one user with Subscriber role or higher.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious users could deface or corrupt all directory listings, inject malicious content, or manipulate business information to cause reputational damage or financial loss.

🟠

Likely Case

Attackers modify listings to include spam, phishing links, or inappropriate content, disrupting the directory's integrity and user trust.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to minor unauthorized edits that can be quickly detected and reverted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via REST API calls. No public exploit code is known, but the vulnerability is simple to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.0.1 or later

Vendor Advisory: https://wordpress.org/plugins/listar-directory-listing/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Listar – Directory Listing & Classifieds'. 4. Click 'Update Now' if available, or manually update to version 3.0.1+. 5. Verify the plugin is active after update.

🔧 Temporary Workarounds

Disable vulnerable REST endpoint

all

Block access to the vulnerable '/wp-json/listar/v1/place/save' endpoint using web server rules or WordPress filters.

Add to .htaccess (Apache): RewriteRule ^wp-json/listar/v1/place/save - [F,L]
Add to nginx config: location ~* /wp-json/listar/v1/place/save { deny all; }

Restrict user roles

all

Temporarily limit Subscriber and higher roles from accessing the site or modify capabilities to prevent exploitation.

Use WordPress plugin like 'User Role Editor' to remove unnecessary capabilities from Subscriber role.

🧯 If You Can't Patch

  • Disable the Listar plugin entirely until patched.
  • Implement strict monitoring of REST API logs for unauthorized access to the vulnerable endpoint.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for Listar plugin version 3.0.0 or earlier.

Check Version:

wp plugin list --name=listar-directory-listing --field=version (if WP-CLI installed)

Verify Fix Applied:

Confirm Listar plugin version is 3.0.1 or later in WordPress admin, and test that Subscriber users cannot modify listings via REST API.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to '/wp-json/listar/v1/place/save' from non-admin users in WordPress or web server logs.
  • Unauthorized modifications to listing content in database or plugin logs.

Network Indicators:

  • REST API calls to the vulnerable endpoint from unexpected IPs or user agents.

SIEM Query:

source="wordpress_logs" AND uri_path="/wp-json/listar/v1/place/save" AND user_role!="administrator"

🔗 References

📤 Share & Export