CVE-2025-1570

Source
https://cve.org/CVERecord?id=CVE-2025-1570
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-1570.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-1570
Published
2025-02-28T09:15:12.203Z
Modified
2025-11-20T12:29:12.912346Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 8.1. This is due to the directoristgeneratepasswordresetpincode() and resetuser_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.

References

Affected packages

Git / github.com/sovware/directorist

Affected ranges

Type
GIT
Repo
https://github.com/sovware/directorist
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

release7.*
release7.10.0
released-v7.*
released-v7.0.4
v7.*
v7.0
v7.0.1
v7.0.2
v7.0.3
v7.0.3.1
v7.0.3.2
v7.0.3.3
v7.0.4.1
v7.0.5
v7.0.5.1
v7.0.5.2
v7.0.5.3
v7.0.5.4
v7.0.5.6
v7.0.6
v7.0.6.1
v7.0.6.2
v7.0.6.3
v7.0.7
v7.0.8
v7.1.0
v7.1.1
v7.1.2
v7.10.1
v7.10.2
v7.10.3
v7.2.0
v7.2.1
v7.2.2
v7.3.0
v7.3.1
v7.3.1.2
v7.3.2
v7.3.3
v7.4.0
v7.4.1
v7.4.2
v7.4.3
v7.4.5
v7.4.6
v7.5.1
v7.5.3
v7.6.0
v7.7.0
v7.7.1
v7.7.2
v7.8.0
v7.8.2
v7.8.6
v8.*
v8.0
v8.0.1
v8.0.10
v8.0.11
v8.0.12
v8.0.2
v8.0.3
v8.0.4
v8.0.5
v8.0.6
v8.0.7
v8.0.8
v8.0.9
v8.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-1570.json"