CVE-2025-63049

5.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the WordPress ListingPro Lead Form plugin that allows attackers to access functionality not properly constrained by access controls. Users of the plugin versions up to and including 1.0.2 are affected. Attackers can exploit this to perform unauthorized actions.

💻 Affected Systems

Products:
  • WordPress ListingPro Lead Form plugin
Versions: n/a through <= 1.0.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using vulnerable plugin versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate lead form data, delete submissions, or modify plugin settings leading to data loss or unauthorized data access.

🟠

Likely Case

Unauthorized users accessing lead form management functions, potentially viewing or modifying form submissions.

🟢

If Mitigated

With proper access controls, only authorized administrators can manage lead forms and submissions.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and accessible via web interfaces.
🏢 Internal Only: LOW - This is primarily an internet-facing WordPress plugin vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some WordPress knowledge but is straightforward once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >1.0.2

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/listingpro-lead-form/vulnerability/wordpress-listingpro-lead-form-plugin-1-0-2-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'ListingPro Lead Form' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the ListingPro Lead Form plugin until patched version is available

wp plugin deactivate listingpro-lead-form

Restrict admin access

all

Implement IP whitelisting for WordPress admin area to limit potential attackers

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized access to plugin endpoints
  • Monitor WordPress admin logs for unauthorized access attempts to lead form functionality

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'ListingPro Lead Form' version 1.0.2 or earlier

Check Version:

wp plugin get listingpro-lead-form --field=version

Verify Fix Applied:

Verify plugin version is greater than 1.0.2 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to /wp-admin/admin-ajax.php with 'action' parameter containing 'listingpro_lead_form'
  • Multiple failed authentication attempts followed by successful access to lead form endpoints

Network Indicators:

  • Unusual traffic patterns to WordPress admin-ajax.php endpoints
  • Requests from unexpected IP addresses accessing lead form management functions

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND query_string="*listingpro_lead_form*") AND user="-"

🔗 References

📤 Share & Export