The WP Directorybox Manager plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.5. This is due to incorrect authentication in the 'wp_dp_enquiry_agent_contact_form_submit_callback' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
History

Wed, 12 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 08 Feb 2025 21:30:00 +0000

Type Values Removed Values Added
Description The WP Directorybox Manager plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.5. This is due to incorrect authentication in the 'wp_dp_enquiry_agent_contact_form_submit_callback' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
Title WP Directorybox Manager <= 2.5 - Authentication Bypass
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-02-08T21:20:58.901Z

Updated: 2025-02-12T20:51:41.842Z

Reserved: 2025-01-07T18:43:54.464Z

Link: CVE-2025-0316

cve-icon Vulnrichment

Updated: 2025-02-12T20:46:27.687Z

cve-icon NVD

Status : Received

Published: 2025-02-08T22:15:28.477

Modified: 2025-02-08T22:15:28.477

Link: CVE-2025-0316

cve-icon Redhat

No data.