VYPR
Medium severity4.3NVD Advisory· Published Dec 6, 2025· Updated Apr 15, 2026

CVE-2025-12574

CVE-2025-12574

Description

The Listar – Directory Listing & Classifieds WordPress Plugin plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the '/wp-json/listar/v1/place/delete' REST API endpoint in all versions up to, and including, 3.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Listar plugin for WordPress (<=3.0.0) lacks a capability check on a REST API endpoint, allowing authenticated users with subscriber-level access to delete arbitrary posts.

The Listar – Directory Listing & Classifieds WordPress Plugin is vulnerable due to a missing capability check on the /wp-json/listar/v1/place/delete REST API endpoint. In all versions up to and including 3.0.0, the endpoint does not verify that the requesting user has the necessary permissions to delete posts, effectively bypassing WordPress's authorization framework [1]. This is a classic case of missing authorization (CWE-862) in a REST API handler.

Exploitation requires an authenticated account with at least Subscriber-level access. No special privileges beyond standard authentication are needed, as the endpoint accepts requests from any logged-in user. An attacker can send a crafted HTTP POST request to the vulnerable endpoint, specifying the ID of any post to delete. The request will be processed without checking if the user is an administrator, editor, or author of the post [1].

Successful exploitation allows an authenticated attacker to delete arbitrary posts on the WordPress site, including published pages, posts, or custom post types managed by the plugin. Data loss can be significant, leading to content removal and potential defacement or disruption of the site's listing functionality.

The plugin was closed on December 4, 2025, and is no longer available for download [1]. Users who have installed the plugin should immediately remove or deactivate it. No patch is available because the plugin is discontinued. Affected sites should migrate to an alternative directory listing plugin [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.