
Cloud Vulnerability DB
A community-led vulnerabilities database
The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to arbitrary file move due to insufficient file path validation in the addlistingaction AJAX action in versions up to and including 8.4.8. This vulnerability was discovered and disclosed on October 25, 2025 (NVD).
The vulnerability stems from insufficient file path validation in the addlistingaction AJAX action. This security flaw allows unauthenticated attackers to move arbitrary files on the server. The vulnerability has been assigned a CVSS v3.1 Base Score of 8.1 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) and is classified as CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (NVD).
The vulnerability can lead to remote code execution when critical files like wp-config.php are moved to accessible locations. This could potentially give attackers complete control over the affected WordPress installation (NVD).
Users should immediately update their Directorist plugin to a version newer than 8.4.8 if available. If an update is not possible, it is recommended to disable the plugin until a patch is released (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."