CVE-2025-0316
Published: 08 February 2025
Description
The WP Directorybox Manager plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.5. This is due to incorrect authentication in the 'wp_dp_enquiry_agent_contact_form_submit_callback' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
Security Summary
CVE-2025-0316 is an authentication bypass vulnerability in the WP Directorybox Manager plugin for WordPress, affecting all versions up to and including 2.5. The flaw arises from incorrect authentication logic in the 'wp_dp_enquiry_agent_contact_form_submit_callback' function, which allows attackers to bypass standard login mechanisms. It is classified under CWE-288 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its high impact on confidentiality, integrity, and availability.
Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required, provided they know the username of an existing site user. Successful exploitation enables them to log in as that user, including high-privilege accounts like administrators, granting full unauthorized access to the WordPress site.
Advisories provide further details on the issue, including the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/3ee1f412-7555-4dec-ba59-49412471a42f?source=cve and the plugin listing on ThemeForest at https://themeforest.net/item/directory-multipurpose-wordpress-theme/10480929. Security practitioners should consult these for patch availability and remediation guidance.
Details
- CWE(s)