CVE Alert: CVE-2025-10488 – wpwax – Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings

CVE-2025-10488

HIGHNo exploitation known

The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to arbitrary file move due to insufficient file path validation in the add_listing_action AJAX action in all versions up to, and including, 8.4.8. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php).

CVSS v3.1 (8.1)
Vendor
wpwax
Product
Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings
Versions
* lte 8.4.8
CWE
CWE-22, CWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Published
2025-10-25T06:49:21.186Z
Updated
2025-10-25T06:49:21.186Z

AI Summary Analysis

**Risk verdict** High risk: enables remote code execution by a low-privilege, authenticated user (Subscriber level) through a path traversal flaw.

**Why this matters** The vulnerability permits moving arbitrary files on the server, which can directly lead to remote code execution if a critical file (eg, wp-config.php) is targetable. Compromise could give attackers full control over the site, exfiltrate data, or deface content, with potential impact on availability and trust.

**Most likely attack path** An authenticated but low-privilege user triggers the add_listing_action AJAX endpoint. Inadequate file path validation allows path traversal to relocate sensitive files. If the attacker places or overwrites a PHP payload in a location executed by the web server, RCE follows. Lateral movement is more likely within the plugin’s scope and may be constrained by file-permissions, but a successful move can yield persistence or broader site takeover.

**Who is most exposed** WordPress sites using the affected plugin, especially on shared hosting or multisite deployments with exposed admin interfaces and enabled file operations via AJAX. Sites with weak access controls or stale credentials are disproportionately at risk.

Detection ideas

  • Look for anomalous calls to admin-ajax.php with action=add_listing_action from authenticated sessions.
  • Monitor for unexpected file moves or creations in web-root or PHP execution paths (including wp-config.php).
  • Correlate spikes in file-write events with authenticated activity from low-privilege accounts.
  • Check for suspicious modification timestamps on core configuration or plugin files.
  • Alert on failed or unusual attempts to move critical system files.

Mitigation and prioritisation

  • Apply the patched version (or vendor-recommended update) to close the path traversal; verify update applies cleanly in staging before production.
  • If patching promptly isn’t possible, implement a WAF rule to block the specific AJAX action or restrict it to higher-privilege roles; disable the action if feasible.
  • Enforce strict account hygiene: rotate credentials, enforce MFA for site managers, and audit for compromised subscriber accounts.
  • Implement file integrity monitoring and restrict write access to sensitive files (e.g., wp-config.php, core PHP files).
  • Change-management: test in a staging environment, then deploy during a maintenance window with backups. If KEV data or EPSS ≥ 0.5 becomes available, adjust priority accordingly.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features