CVE-2025-14452
📋 TL;DR
This vulnerability allows unauthenticated attackers to inject malicious scripts via the 'wpcr3_fname' parameter in the WP Customer Reviews WordPress plugin. When victims click specially crafted links, attackers can steal session cookies, redirect users, or perform actions on their behalf. All WordPress sites using WP Customer Reviews plugin versions 3.7.5 and earlier are affected.
💻 Affected Systems
- WP Customer Reviews for WordPress
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal administrator session cookies, gain full control of WordPress site, install backdoors, deface website, or steal sensitive user data.
Likely Case
Attackers steal user session cookies, redirect visitors to malicious sites, or perform limited actions within user context.
If Mitigated
Script execution blocked by Content Security Policy (CSP) or browser XSS filters, limiting impact to failed script execution attempts.
🎯 Exploit Status
Reflected XSS requires user interaction (clicking malicious link) but is trivial to craft and deliver via phishing.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.7.6 or later
Vendor Advisory: https://wordpress.org/plugins/wp-customer-reviews/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WP Customer Reviews' and click 'Update Now'. 4. Verify update to version 3.7.6 or higher.
🔧 Temporary Workarounds
Temporary Input Sanitization
allAdd custom input sanitization for wpcr3_fname parameter in theme functions.php
add_filter('preprocess_comment', 'sanitize_wpcr3_fname'); function sanitize_wpcr3_fname($commentdata) { if(isset($_GET['wpcr3_fname'])) { $_GET['wpcr3_fname'] = sanitize_text_field($_GET['wpcr3_fname']); } return $commentdata; }
Web Application Firewall Rule
allBlock malicious payloads in wpcr3_fname parameter
WAF specific - create rule to block requests containing <script> or javascript: in wpcr3_fname parameter
🧯 If You Can't Patch
- Disable WP Customer Reviews plugin immediately
- Implement strict Content Security Policy (CSP) headers to block inline script execution
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin → Plugins → Installed Plugins. If version is 3.7.5 or lower, you are vulnerable.
Check Version:
wp plugin list --name='wp-customer-reviews' --field=version (WP-CLI) or check WordPress admin panel
Verify Fix Applied:
After updating, verify version shows 3.7.6 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP GET requests containing 'wpcr3_fname' parameter with script tags or javascript: payloads
- Unusual referrer URLs containing encoded script payloads
Network Indicators:
- Outbound connections to suspicious domains following visits to pages with wpcr3_fname parameter
- Unusual cookie theft patterns
SIEM Query:
source="web_logs" AND uri="*wpcr3_fname=*" AND (uri="*<script>*" OR uri="*javascript:*")
🔗 References
- https://plugins.trac.wordpress.org/browser/wp-customer-reviews/tags/3.7.4/wp-customer-reviews-3.php#L205
- https://plugins.trac.wordpress.org/browser/wp-customer-reviews/tags/3.7.4/wp-customer-reviews-3.php#L835
- https://plugins.trac.wordpress.org/browser/wp-customer-reviews/trunk/wp-customer-reviews-3.php#L205
- https://plugins.trac.wordpress.org/browser/wp-customer-reviews/trunk/wp-customer-reviews-3.php#L835
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3417719%40wp-customer-reviews&new=3417719%40wp-customer-reviews&sfp_email=&sfph_mail=
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3417782%40wp-customer-reviews&new=3417782%40wp-customer-reviews&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/c4f22ca7-0e7c-438a-8e63-cf3723d087f4?source=cve