Plugin Vulnerability Hub
Plugin 4 known issues Latest disclosed Jan 27, 2026

aDirectory – WP Business Directory Plugin and Classified Ads Listings Directory Vulnerabilities

Review known vulnerability records for the WordPress plugin aDirectory – WP Business Directory Plugin and Classified Ads Listings Directory (`adirectory`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2025-67975 and CVE-2024-13541, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
4
High or Critical
2
Patch Coverage
100%
Last Updated
Feb 02, 2026
Priority CVE Quick Links

Fast paths into aDirectory – WP Business Directory Plugin and Classified Ads Listings Directory CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
3
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for aDirectory – WP Business Directory Plugin and Classified Ads Listings Directory so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
4 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
1 critical and 1 high severity finding.
Recent CVEs
CVE-2025-67975 and CVE-2024-13541
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for aDirectory – WP Business Directory Plugin and Classified Ads Listings Directory

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: Yes CVE-2025-67975
CVE-2025-67975: aDirectory <= 3.0.3 - Missing Authorization

The aDirectory – WP Business Directory Plugin and Classified Ads Listings Directory plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 3.0.3. This makes it possible for authenticated atta...

Published
Jan 27, 2026
Patched Release
3.0.4
Affected Versions
Versions up to 3.0.3
Next Step
Update to 3.0.4 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-13541
CVE-2024-13541: aDirectory – WordPress Directory Listing Plugin <= 2.3 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Deletion

The aDirectory – WordPress Directory Listing Plugin plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the adqs_delete_listing() function in all versions up to, and including, 2.3. This makes it possible for authenticated attacker...

Published
Feb 11, 2025
Patched Release
2.3.5
Affected Versions
Versions up to 2.3
Next Step
Update to 2.3.5 or newer if supported.
Plugin High Patched: Yes
aDirectory – WordPress Directory Listing Plugin <= 1.6.5 - Unauthenticated PHP Object Injection

The aDirectory – WordPress Directory Listing Plugin plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.6.5 via deserialization of untrusted input from the 'carousel_settings' attribute in the 'adqs_taxonomies' shortcode. This makes...

Published
Jan 20, 2025
Patched Release
1.9
Affected Versions
Versions up to 1.6.5
Next Step
Update to 1.9 or newer if supported.
Plugin Critical Patched: Yes CVE-2024-50420
CVE-2024-50420: aDirectory <= 1.3 - Unauthenticated Arbitrary File Upload

The aDirectory – Directory Listing WordPress Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 1.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the af...

Published
Oct 24, 2024
Patched Release
1.3.1
Affected Versions
Versions up to 1.3
Next Step
Update to 1.3.1 or newer if supported.