Description
Missing Authorization vulnerability in Strategy11 Team Business Directory business-directory-plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Business Directory: from n/a through <= 6.4.19.
Published: 2025-12-16
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Based on the description, the missing authorization flaw enables an attacker to bypass the intended access controls. Based on the description, without proper restrictions the attacker could access administrative functions or confidential data stored by the plugin. Based on the description, this failure could lead to unauthorized disclosure or modification of plugin settings, potentially compromising the integrity of the website.

Affected Systems

WordPress sites deploying the Strategy11 Team Business Directory plugin before version 6.4.20 are affected. All releases from the earliest available version up to and including 6.4.19 contain this broken access control issue.

Risk and Exploitability

The CVSS score of 4.9 indicates moderate severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in CISA's KEV catalog. Based on the description, it is inferred that attackers might exploit the flaw via web requests targeting endpoints that expect elevated privileges, and that the plugin code removes the necessary authorization check, potentially allowing any authenticated or possibly unauthenticated user to invoke sensitive functions.

Generated by OpenCVE AI on April 29, 2026 at 22:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Business Directory plugin to the latest version (≥ 6.4.20).
  • Revoke or limit permissions for users who should not have administrative access to the plugin. This includes disabling the plugin for non-admin roles or restricting its capabilities in WordPress.
  • Implement additional server‑side checks to ensure that only users with the necessary capabilities can perform privileged actions, or apply a web application firewall rule to block suspicious requests to the plugin’s endpoints.

Generated by OpenCVE AI on April 29, 2026 at 22:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 18 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Strategy11
Strategy11 business Directory Plugin
Wordpress
Wordpress wordpress
Vendors & Products Strategy11
Strategy11 business Directory Plugin
Wordpress
Wordpress wordpress

Tue, 16 Dec 2025 08:30:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Strategy11 Team Business Directory business-directory-plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Business Directory: from n/a through <= 6.4.19.
Title WordPress Business Directory plugin <= 6.4.19 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Strategy11 Business Directory Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:15.185Z

Reserved: 2025-11-06T13:11:11.068Z

Link: CVE-2025-64630

cve-icon Vulnrichment

Updated: 2025-12-18T20:19:34.078Z

cve-icon NVD

Status : Deferred

Published: 2025-12-16T09:15:55.200

Modified: 2026-04-27T16:16:42.500

Link: CVE-2025-64630

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T22:45:06Z

Weaknesses