CVE-2025-1232

8.8 HIGH

📋 TL;DR

This vulnerability in the Site Reviews WordPress plugin allows unauthenticated attackers to inject malicious scripts into review fields, which execute when other users view those reviews. All WordPress sites running vulnerable versions of this plugin are affected. This is a stored cross-site scripting (XSS) vulnerability that requires no authentication to exploit.

💻 Affected Systems

Products:
  • Site Reviews WordPress Plugin
Versions: All versions before 7.2.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over the WordPress site, redirect users to malicious sites, or deploy malware to visitors' browsers.

🟠

Likely Case

Attackers will inject malicious JavaScript to steal user session cookies, potentially compromising user accounts and performing actions on their behalf.

🟢

If Mitigated

With proper web application firewalls and content security policies, malicious scripts would be blocked or sanitized before execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and involves simple script injection into review fields.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.5

Vendor Advisory: https://wpscan.com/vulnerability/c4ea8357-ddd7-48ac-80c9-15b924715b14/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Site Reviews' and click 'Update Now'. 4. Verify version is 7.2.5 or later.

🔧 Temporary Workarounds

Disable Plugin

WordPress

Temporarily disable the Site Reviews plugin until patched

wp plugin deactivate site-reviews

Implement Content Security Policy

all

Add CSP headers to block inline scripts and restrict script sources

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Add to wp-config.php: header("Content-Security-Policy: default-src 'self'");

🧯 If You Can't Patch

  • Disable the Site Reviews plugin completely
  • Implement a web application firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Site Reviews → Version. If version is below 7.2.5, you are vulnerable.

Check Version:

wp plugin get site-reviews --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 7.2.5 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to review submission endpoints
  • JavaScript payloads in review content fields
  • Multiple review submissions from same IP

Network Indicators:

  • Script tags in HTTP POST data to review endpoints
  • Base64 encoded payloads in review submissions

SIEM Query:

source="wordpress.log" AND ("site-reviews" OR "review-submit") AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export