First published: Sat Mar 15 2025(Updated: )
The Directory Listings WordPress plugin – uListing plugin for WordPress is vulnerable to unauthorized modification of data and PHP Object Injection due to a missing capability check on the stm_listing_ajax AJAX action in all versions up to, and including, 2.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to update post meta data and inject PHP Objects that may be unserialized.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
uListing | <=2.1.7 | |
WordPress | <=2.1.7 | |
StylemixThemes uListing | <=2.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1657 has a high severity due to the potential for unauthorized data modification and PHP Object Injection.
To fix CVE-2025-1657, update the Directory Listings uListing plugin to version 2.1.8 or later.
CVE-2025-1657 affects all versions of the Directory Listings uListing plugin up to and including 2.1.7.
CVE-2025-1657 introduces vulnerabilities related to unauthorized modification of data and PHP Object Injection.
Users of the Directory Listings uListing plugin for WordPress running version 2.1.7 or earlier are impacted by CVE-2025-1657.