CVE-2025-1570

Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings <= 8.1 - Privilege Escalation and Account Takeover via Weak OTP

Description

The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 8.1. This is due to the directorist_generate_password_reset_pin_code() and reset_user_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.

Category

8.1
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.06%
Third-Party Advisory wordfence.com
Affected: wpwax Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-1570?
CVE-2025-1570 has been scored as a high severity vulnerability.
How to fix CVE-2025-1570?
To fix CVE-2025-1570, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-1570 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-1570 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-1570?
CVE-2025-1570 affects wpwax Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.