Impact
The Directory Listings WordPress plugin – uListing versions up to 2.2.0 contains a flaw in the stm_listing_profile_edit AJAX action, which fails to restrict the user meta that can be updated. Because of this weakness, any authenticated user with the Subscriber role or higher can modify their own meta values and elevate their privileges to an administrator, giving them full control over the site, including the ability to publish content, manage users, and install plugins.
Affected Systems
WordPress sites using the Directory Listings WordPress plugin – uListing (stylemixthemes) are affected. All releases through and including version 2.2.0 are vulnerable.
Risk and Exploitability
The CVSS score of 8.8 classifies the vulnerability as high severity, while the EPSS score of less than 1% indicates a low probability of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. Attackers need only authenticated access to a Subscriber or higher role, making exploitation feasible once credentials are compromised. Despite the low EPSS rating, the potential impact of gaining administrator rights warrants prompt remediation.
OpenCVE Enrichment
EUVD