Easy Property Listings Vulnerability (Medium) – CVE-2025-68072

Easy Property Listings Vulnerability (Medium) – CVE-2025-68072

by | Mar 18, 2026 | Plugins

Attack Vectors

CVE-2025-68072 affects the Easy Property Listings WordPress plugin (slug: easy-property-listings) in versions up to and including 3.5.20. With a Medium severity rating (CVSS 5.3), the primary concern is that an attacker can act without logging in.

Because the issue is reachable over the network and does not require user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N), the most likely attack path is automated scanning of WordPress sites to find the plugin and then attempting to trigger the affected function remotely.

Official record: https://www.cve.org/CVERecord?id=CVE-2025-68072

Security Weakness

The vulnerability is described as a missing authorization check (specifically, a missing capability check) on a function within Easy Property Listings (through version 3.5.20). In practical terms, this means the plugin does not consistently confirm that a requester has the right permissions before allowing a protected action to proceed.

As a result, unauthenticated visitors may be able to perform an unauthorized action that should be restricted to trusted roles (for example, site admins or editors). The published CVSS details indicate the impact is primarily on integrity (I:L), meaning the concern is unauthorized changes rather than data theft or a full outage.

Source: Wordfence vulnerability advisory

Technical or Business Impacts

For marketing and business teams, the key risk is loss of control over site content or configuration that supports lead generation and brand trust. Even limited unauthorized changes can create downstream business problems: broken campaign landing pages, altered property listings, misleading calls-to-action, or workflow disruption for sales teams relying on accurate listing information.

Because this is rated Medium (CVSS 5.3) and indicates limited integrity impact, it’s not positioned as a “site takeover” event based on the public scoring alone. However, unauthorized actions—especially if automated—can still drive real costs through incident response time, campaign downtime, and reputational damage if site visitors see incorrect or inconsistent property information.

Remediation: Update Easy Property Listings to version 3.5.21 or newer (patched). After updating, confirm the plugin version across all environments (production, staging, and any regional sites) and review recent changes to listings/pages for unexpected modifications.

Similar attacks (real examples): Unauthenticated plugin flaws have been widely exploited in the past, including CVE-2020-25213 (wp-file-manager incident) and CVE-2020-36326 (Ultimate Member privilege-related issue). These examples underscore why “no-login-required” issues tend to attract rapid scanning and exploitation.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers