CVE-2023-27625

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the WordPress Site Reviews plugin that allows attackers to exploit incorrectly configured access controls. It affects all versions up to 6.5.0, potentially allowing unauthorized users to perform actions they shouldn't be able to. WordPress administrators using vulnerable versions of Site Reviews are affected.

💻 Affected Systems

Products:
  • WordPress Site Reviews plugin
Versions: All versions up to and including 6.5.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with Site Reviews plugin enabled. The vulnerability exists in the plugin's access control implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could modify or delete reviews, manipulate ratings, or potentially access administrative functions of the plugin, compromising review integrity and site functionality.

🟠

Likely Case

Attackers could manipulate review content, ratings, or visibility without proper authorization, affecting the credibility of the review system.

🟢

If Mitigated

With proper access controls and authentication checks, only authorized users can perform review-related actions as intended.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires understanding of WordPress plugin structure and access control bypass techniques, but the vulnerability is in authorization logic which is typically straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 6.5.0

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/site-reviews/vulnerability/wordpress-site-reviews-plugin-6-5-0-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Site Reviews' plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Site Reviews Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate site-reviews

Restrict Plugin Access

all

Use WordPress roles and capabilities to restrict who can access Site Reviews functions

🧯 If You Can't Patch

  • Implement strict access controls at web application firewall level
  • Monitor and audit all review-related activities for unauthorized changes

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Site Reviews → Version. If version is 6.5.0 or earlier, you are vulnerable.

Check Version:

wp plugin get site-reviews --field=version

Verify Fix Applied:

After updating, verify version is higher than 6.5.0 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to Site Reviews endpoints
  • Review modifications from unauthenticated or low-privilege users
  • Failed authorization attempts on review management functions

Network Indicators:

  • HTTP requests to /wp-content/plugins/site-reviews/ endpoints without proper authentication headers
  • Unusual patterns of review submissions or modifications

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND parameters CONTAINS "site-reviews") AND (user_role!="administrator" OR user_id="0")

🔗 References

📤 Share & Export