Directorist: AI-Powered Business Directory, Listings & Classified A…

Directorist: AI-Powered Business Directory, Listings & Classified A…

by | Apr 14, 2026 | Uncategorized

Attack Vectors

CVE-2025-68069 is a Medium-severity missing authorization issue affecting the Directorist: AI-Powered Business Directory, Listings & Classified Ads plugin (slug: directorist) in versions up to and including 8.6.6. Because the problem involves a missing capability check, an attacker does not need to be an administrator to attempt exploitation.

The primary attack vector is an attacker first obtaining (or already having) a low-privilege WordPress account—specifically subscriber-level access or above—and then invoking the affected plugin function to perform an action they should not be allowed to perform. This lowers the barrier compared to vulnerabilities that require admin access, and it increases the risk from compromised customer accounts, partner logins, or internal user accounts.

CVSS details reflect this real-world accessibility: CVSS 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N), meaning it is reachable over the network, requires low privileges, and does not require user interaction.

Security Weakness

The core weakness is missing authorization (a missing capability check) in a Directorist function in versions up to 8.6.6. In practical business terms, the plugin does not consistently verify whether the logged-in user is allowed to perform a specific operation, even though they are authenticated.

This can allow authenticated users with minimal privileges to trigger actions that should be restricted to higher-trust roles. While the advisory indicates no confidentiality impact, it does indicate an integrity impact, meaning changes could be made that the organization did not intend or approve.

Remediation is straightforward: update Directorist to version 8.6.7 or newer (a patched release). Reference: Wordfence vulnerability record. CVE record: CVE-2025-68069.

Technical or Business Impacts

Even at Medium severity, missing authorization flaws matter because they can undermine trust in your site’s workflows and approvals. If a subscriber-level account (or any low-privilege account) is abused, the business risk is that unauthorized changes can occur inside the directory, listings, or classified ads features that may be central to lead generation and revenue.

Potential business impacts include:

Brand and customer trust risk: unauthorized actions performed through the plugin can lead to content or listing states that appear “official,” impacting perceived reliability of your directory and any paid placements or promotions tied to it.

Operational disruption: marketing and operations teams may need to spend time investigating unexpected changes, restoring content, and responding to customer complaints or partner disputes.

Compliance and audit exposure: for organizations that need clear role-based controls, a missing capability check can create gaps in internal controls—especially if subscriber accounts include customers, contractors, or community members.

Recommended action: prioritize updating Directorist to 8.6.7+ and review which users have subscriber (or higher) access, especially on sites where accounts are created automatically. Consider tightening account creation, limiting unnecessary roles, and monitoring for unusual activity after patching.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers