CVE-2023-36528

5.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to manipulate star ratings on WordPress sites without proper authorization by exploiting IP spoofing. It affects all WordPress installations using the kk Star Ratings plugin versions up to 5.4.3. Attackers can artificially inflate or deflate ratings on posts and pages.

💻 Affected Systems

Products:
  • kk Star Ratings WordPress Plugin
Versions: All versions up to and including 5.4.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate ratings to damage reputation, influence user behavior, or create false popularity signals that affect SEO and user trust.

🟠

Likely Case

Minor rating manipulation affecting content credibility, potentially leading to inaccurate user feedback and skewed analytics.

🟢

If Mitigated

With proper access controls and rate limiting, impact is limited to occasional rating anomalies that can be detected and corrected.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted HTTP requests with spoofed IP addresses to bypass rate limiting and authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4.4 and later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/kk-star-ratings/vulnerability/wordpress-kk-star-ratings-plugin-5-4-3-rate-manipulation-due-to-ip-spoofing-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'kk Star Ratings' and click 'Update Now'. 4. Alternatively, download version 5.4.4+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the kk Star Ratings plugin until patched

wp plugin deactivate kk-star-ratings

Implement Web Application Firewall Rules

all

Block suspicious rating requests and implement IP-based rate limiting

🧯 If You Can't Patch

  • Implement server-side IP validation and rate limiting at the web server level
  • Monitor rating activity logs for unusual patterns and implement manual review

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for kk Star Ratings version

Check Version:

wp plugin get kk-star-ratings --field=version

Verify Fix Applied:

Verify plugin version is 5.4.4 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Multiple rating submissions from same IP in short time
  • Rating changes without corresponding page views
  • Unusual rating patterns across content

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with 'action=kk_star_ratings' parameter
  • Suspicious X-Forwarded-For header patterns

SIEM Query:

source="web_server_logs" AND uri="/wp-admin/admin-ajax.php" AND "action=kk_star_ratings" AND (status=200 OR status=302) | stats count by src_ip

🔗 References

📤 Share & Export