CVE-2023-2833

8.8 HIGH

📋 TL;DR

The ReviewX WordPress plugin up to version 1.6.13 contains a privilege escalation vulnerability that allows authenticated users with minimal permissions (like subscribers) to elevate their privileges to administrator or other roles. This occurs due to insufficient restrictions in the 'rx_set_screen_options' function, allowing attackers to modify their user role via screen option parameters. WordPress sites using vulnerable ReviewX plugin versions are affected.

💻 Affected Systems

Products:
  • WordPress ReviewX Plugin
Versions: Up to and including 1.6.13
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with ReviewX plugin enabled. Any authenticated user (including subscribers) can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative access to the WordPress site, enabling complete site takeover, data theft, malware injection, or site defacement.

🟠

Likely Case

Attackers elevate privileges to administrator level and install backdoors, create new admin accounts, or modify site content.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized role changes that can be detected and reversed before significant damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but minimal permissions. Public proof-of-concept details are available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.14 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2916148%40reviewx&old=2912114%40reviewx&sfp_email=&sfph_mail=#file472

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find ReviewX plugin and click 'Update Now' if available. 4. Alternatively, download version 1.6.14+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable ReviewX Plugin

all

Temporarily deactivate the vulnerable plugin until patched.

wp plugin deactivate reviewx

Restrict User Registration

all

Disable new user registration to prevent attackers from creating accounts.

Navigate to Settings > General in WordPress admin and uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Implement strict user role monitoring and alert on any role changes
  • Apply web application firewall rules to block requests containing 'wp_screen_options[option]' and 'wp_screen_options[value]' parameters

🔍 How to Verify

Check if Vulnerable:

Check ReviewX plugin version in WordPress admin panel under Plugins > Installed Plugins. If version is 1.6.13 or lower, you are vulnerable.

Check Version:

wp plugin get reviewx --field=version

Verify Fix Applied:

After updating, confirm ReviewX plugin version shows 1.6.14 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with 'action=rx_set_screen_options' containing role modification parameters
  • User role change events in WordPress audit logs
  • Unexpected privilege escalation events

Network Indicators:

  • HTTP POST requests with 'wp_screen_options[option]' and 'wp_screen_options[value]' parameters targeting admin-ajax.php

SIEM Query:

source="wordpress_logs" AND ("rx_set_screen_options" OR "wp_screen_options[option]")

🔗 References

📤 Share & Export