CVE-2024-3050

9.1 CRITICAL

📋 TL;DR

The Site Reviews WordPress plugin before version 7.0.0 insecurely retrieves client IP addresses from HTTP headers that can be manipulated by attackers. This allows malicious actors to spoof their IP addresses to bypass IP-based blocking mechanisms like rate limiting or geo-blocking. Any WordPress site using vulnerable versions of this plugin is affected.

💻 Affected Systems

Products:
  • Site Reviews WordPress Plugin
Versions: All versions before 7.0.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using default plugin configuration are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers bypass all IP-based security controls, enabling brute force attacks, content scraping, or accessing geo-restricted content without detection.

🟠

Likely Case

Attackers evade IP-based rate limiting or blocking, allowing continued malicious activity against the WordPress site.

🟢

If Mitigated

With proper IP validation and header sanitization, the impact is minimal as legitimate IP-based controls remain effective.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP header manipulation, which is trivial with standard web testing tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.0.0

Vendor Advisory: https://wpscan.com/vulnerability/04c1581e-fd36-49d4-8463-b49915d4b1ac/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Site Reviews' plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 7.0.0+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Site Reviews plugin until patched.

wp plugin deactivate site-reviews

Web Application Firewall Rule

all

Configure WAF to validate and sanitize HTTP headers before reaching WordPress.

🧯 If You Can't Patch

  • Implement network-level IP filtering at firewall or load balancer
  • Use alternative review plugin with proper IP validation

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Site Reviews for version number below 7.0.0

Check Version:

wp plugin get site-reviews --field=version

Verify Fix Applied:

Confirm plugin version is 7.0.0 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests from same IP with varying X-Forwarded-For headers
  • IP address mismatches between different logging sources

Network Indicators:

  • HTTP requests with manipulated X-Forwarded-For, X-Real-IP, or Client-IP headers

SIEM Query:

source="wordpress.log" AND "site-reviews" AND ("X-Forwarded-For" OR "X-Real-IP")

🔗 References

📤 Share & Export