Impact
The Directorist plugin for WordPress contains a missing capability check in two AJAX actions, 'directorist_prepare_listings_export_file' and 'directorist_type_slug_change', allowing authenticated users with Subscriber level or higher to export listing details or alter the plugin's slug without proper authorization. This vulnerability permits disclosure of sensitive listing information and arbitrary changes to directory configuration.
Affected Systems
The vulnerability affects the Directorist AI-Powered Business Directory and Listings & Classified Ads plugin distributed by wpwax. All releases up to and including version 8.5.2 are impacted. Users running these versions on WordPress sites should verify their installed version against the remediation guidance.
Risk and Exploitability
The CVSS base score of 6.5 indicates medium severity. The EPSS score of less than 1% suggests a low current exploitation probability. The issue is not listed in the CISA KEV catalog. Attackers must first authenticate as a user with Subscriber or higher capability; exploitation occurs via authenticated AJAX endpoints, allowing download of listing data or modification of the slug.
OpenCVE Enrichment