CVE-2022-46809
📋 TL;DR
This CVE describes a CSV injection vulnerability in the ReviewX WordPress plugin for WooCommerce. Attackers can embed malicious formulas in CSV files exported by the plugin, which execute when opened in spreadsheet applications like Excel. All WordPress sites using vulnerable versions of the ReviewX plugin are affected.
💻 Affected Systems
- ReviewX – Multi-criteria Rating & Reviews for WooCommerce WordPress plugin
📦 What is this software?
Reviewx by Wpdeveloper
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution on client machines opening malicious CSV files, data theft, or complete system compromise via formula execution in spreadsheet applications.
Likely Case
Data exfiltration or client-side code execution when users open exported CSV files containing malicious formulas in vulnerable spreadsheet applications.
If Mitigated
Limited impact if users open CSV files in text editors or properly configured spreadsheet applications that disable formula execution.
🎯 Exploit Status
Exploitation requires authenticated access to generate or upload CSV files. CSV injection techniques are well-documented and easy to implement.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.6.8 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/reviewx/wordpress-reviewx-plugin-1-6-6-csv-injection
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'ReviewX – Multi-criteria Rating & Reviews for WooCommerce'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.6.8+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable CSV export functionality
allTemporarily disable the CSV export feature in ReviewX plugin settings until patched.
Educate users on safe CSV handling
allInstruct users to open CSV files in text editors or disable formula execution in spreadsheet applications.
🧯 If You Can't Patch
- Restrict plugin access to trusted users only
- Implement web application firewall rules to block CSV file uploads containing formula patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → ReviewX plugin version. If version is 1.6.7 or lower, you are vulnerable.
Check Version:
wp plugin list --name=reviewx --field=version (if WP-CLI installed)
Verify Fix Applied:
Verify plugin version is 1.6.8 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- CSV file exports from ReviewX plugin
- User access to review/export functionality
Network Indicators:
- CSV file downloads from /wp-content/uploads/reviewx/ or similar paths
SIEM Query:
source="wordpress" AND (plugin="reviewx" AND action="export")