CVE-2025-1657
Directory Listings WordPress plugin – uListing <= 2.2.0 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Meta Update and PHP Object Injection
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
The Directory Listings WordPress plugin – uListing plugin for WordPress is vulnerable to unauthorized modification of data and PHP Object Injection due to a missing capability check on the stm_listing_ajax AJAX action in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update post meta data and inject PHP Objects that may be unserialized. A capability check was added in 2.1.8, but the unserialize is still present.
| CWE | CWE-862 |
| Vendor | stylemix |
| Product | directory listings wordpress plugin – ulisting |
| Published | Mar 15, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for stylemix directory listings wordpress plugin – ulisting
Be the first to know when new high vulnerabilities affecting stylemix directory listings wordpress plugin – ulisting are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
stylemix / Directory Listings WordPress plugin – uListing
0 ≤ 2.2.0
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/0e70184f-94b6-4742-b99b-6eec9d28f17c?source=cve wordpress.org: https://wordpress.org/plugins/ulisting/ plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3261184/ulisting/trunk/includes/classes/StmListing.php
Credits
Nguyen Tan Phat