Cyber Posture

CVE-2025-1657

High

Published: 15 March 2025

Published
15 March 2025
Modified
08 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0015 34.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.

Security Summary

CVE-2025-1657 affects the uListing Directory Listings WordPress plugin, specifically versions up to and including 2.2.0. The vulnerability stems from a missing capability check on the stm_listing_ajax AJAX action, enabling unauthorized modification of data and PHP Object Injection. This flaw, classified under CWE-862 (Missing Authorization), allows attackers to update post meta data and inject PHP objects that may later be unserialized, earning a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Authenticated attackers with subscriber-level access or higher can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation enables modification of post metadata and injection of malicious PHP objects, potentially leading to high confidentiality, integrity, and availability impacts depending on the unserialized objects and site configuration.

Advisories note that a capability check was added in version 2.1.8, though the unserialize functionality remains present. Relevant references include the plugin's Trac changeset 3261184 in StmListing.php, the official WordPress plugin page, and Wordfence's threat intelligence details on the issue. Security practitioners should urge site owners to update to the latest version beyond 2.2.0 where possible and review AJAX handlers for similar authorization gaps.

Details

CWE(s)
CWE-862

Affected Products

stylemixthemes
ulisting
≤ 2.1.7

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

The vulnerability in a public-facing WordPress plugin directly enables exploitation of the application (T1190) and unauthorized modification of stored post meta data (T1565.001) due to the missing capability check on the AJAX action; PHP object injection may facilitate further impacts but lacks a direct technique mapping without additional details on outcomes.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References