Skip to main content

CVE-2023-4686: CWE-862 Missing Authorization in bompus WP Customer Reviews

Medium
VulnerabilityCVE-2023-4686cvecve-2023-4686cwe-862
Published: Wed Nov 22 2023 (11/22/2023, 15:33:22 UTC)
Source: CVE Database V5
Vendor/Project: bompus
Product: WP Customer Reviews

Description

The WP Customer Reviews plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.6.6 via the ajax_enabled_posts function. This can allow authenticated attackers to extract sensitive data such as post titles and slugs, including those of protected and trashed posts and pages in addition to other post types such as galleries.

AI-Powered Analysis

AILast updated: 07/11/2025, 02:17:30 UTC

Technical Analysis

CVE-2023-4686 is a medium-severity vulnerability affecting the WP Customer Reviews plugin for WordPress, developed by bompus. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. Specifically, the flaw exists in the ajax_enabled_posts function of the plugin in all versions up to and including 3.6.6. This function improperly handles authorization checks, allowing authenticated users with limited privileges to access sensitive information that should otherwise be restricted. The exposed data includes post titles and slugs, not only for publicly available posts but also for protected and trashed posts and pages, as well as other post types such as galleries. This leakage of sensitive metadata could aid attackers in reconnaissance activities, potentially facilitating further targeted attacks or data harvesting. The vulnerability requires the attacker to be authenticated, but no user interaction is needed beyond that. The CVSS v3.1 base score is 4.3, reflecting a network attack vector with low complexity, requiring privileges but no user interaction, and resulting in limited confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild, and no official patches or updates have been linked yet, indicating that mitigation may require manual intervention or plugin updates once available.

Potential Impact

For European organizations using WordPress sites with the WP Customer Reviews plugin, this vulnerability poses a risk of sensitive information exposure. Although the data exposed is limited to post metadata (titles and slugs), the inclusion of protected and trashed content could reveal internal or confidential information not intended for public or broad internal access. This could undermine privacy policies and data protection regulations such as GDPR if the exposed data includes personal or sensitive content. Additionally, attackers could use the leaked information to map site structure, identify valuable content, or craft more effective phishing or social engineering attacks targeting the organization. While the vulnerability does not directly allow data modification or service disruption, the confidentiality breach could have reputational and compliance consequences. The requirement for authentication limits the attack surface to users who have some level of access, but in environments where user accounts are numerous or less strictly controlled, the risk increases. European organizations with public-facing WordPress sites that rely on this plugin for customer reviews should be particularly vigilant, especially those in sectors handling sensitive customer data such as finance, healthcare, and e-commerce.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are running the affected versions of the WP Customer Reviews plugin (up to 3.6.6). Immediate steps include restricting plugin usage to trusted users only and auditing user privileges to minimize the number of authenticated users who could exploit this flaw. Organizations should monitor access logs for unusual activity related to AJAX requests targeting the ajax_enabled_posts function. Until an official patch is released, consider disabling or removing the plugin if feasible or replacing it with alternative customer review solutions that have no known vulnerabilities. Implementing Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests related to this plugin can provide an additional layer of defense. Regularly updating WordPress core and plugins, and subscribing to vulnerability advisories from trusted sources, will ensure timely application of patches once available. Finally, conduct internal security awareness to ensure users understand the risks of privilege misuse and enforce strong authentication and access control policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2023-08-31T17:55:27.619Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f581b0bd07c3938a76b

Added to database: 6/10/2025, 6:54:16 PM

Last enriched: 7/11/2025, 2:17:30 AM

Last updated: 7/30/2025, 7:48:01 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats