CVE-2023-4686: CWE-862 Missing Authorization in bompus WP Customer Reviews
The WP Customer Reviews plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.6.6 via the ajax_enabled_posts function. This can allow authenticated attackers to extract sensitive data such as post titles and slugs, including those of protected and trashed posts and pages in addition to other post types such as galleries.
AI Analysis
Technical Summary
CVE-2023-4686 is a medium-severity vulnerability affecting the WP Customer Reviews plugin for WordPress, developed by bompus. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. Specifically, the flaw exists in the ajax_enabled_posts function of the plugin in all versions up to and including 3.6.6. This function improperly handles authorization checks, allowing authenticated users with limited privileges to access sensitive information that should otherwise be restricted. The exposed data includes post titles and slugs, not only for publicly available posts but also for protected and trashed posts and pages, as well as other post types such as galleries. This leakage of sensitive metadata could aid attackers in reconnaissance activities, potentially facilitating further targeted attacks or data harvesting. The vulnerability requires the attacker to be authenticated, but no user interaction is needed beyond that. The CVSS v3.1 base score is 4.3, reflecting a network attack vector with low complexity, requiring privileges but no user interaction, and resulting in limited confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild, and no official patches or updates have been linked yet, indicating that mitigation may require manual intervention or plugin updates once available.
Potential Impact
For European organizations using WordPress sites with the WP Customer Reviews plugin, this vulnerability poses a risk of sensitive information exposure. Although the data exposed is limited to post metadata (titles and slugs), the inclusion of protected and trashed content could reveal internal or confidential information not intended for public or broad internal access. This could undermine privacy policies and data protection regulations such as GDPR if the exposed data includes personal or sensitive content. Additionally, attackers could use the leaked information to map site structure, identify valuable content, or craft more effective phishing or social engineering attacks targeting the organization. While the vulnerability does not directly allow data modification or service disruption, the confidentiality breach could have reputational and compliance consequences. The requirement for authentication limits the attack surface to users who have some level of access, but in environments where user accounts are numerous or less strictly controlled, the risk increases. European organizations with public-facing WordPress sites that rely on this plugin for customer reviews should be particularly vigilant, especially those in sectors handling sensitive customer data such as finance, healthcare, and e-commerce.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are running the affected versions of the WP Customer Reviews plugin (up to 3.6.6). Immediate steps include restricting plugin usage to trusted users only and auditing user privileges to minimize the number of authenticated users who could exploit this flaw. Organizations should monitor access logs for unusual activity related to AJAX requests targeting the ajax_enabled_posts function. Until an official patch is released, consider disabling or removing the plugin if feasible or replacing it with alternative customer review solutions that have no known vulnerabilities. Implementing Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests related to this plugin can provide an additional layer of defense. Regularly updating WordPress core and plugins, and subscribing to vulnerability advisories from trusted sources, will ensure timely application of patches once available. Finally, conduct internal security awareness to ensure users understand the risks of privilege misuse and enforce strong authentication and access control policies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-4686: CWE-862 Missing Authorization in bompus WP Customer Reviews
Description
The WP Customer Reviews plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.6.6 via the ajax_enabled_posts function. This can allow authenticated attackers to extract sensitive data such as post titles and slugs, including those of protected and trashed posts and pages in addition to other post types such as galleries.
AI-Powered Analysis
Technical Analysis
CVE-2023-4686 is a medium-severity vulnerability affecting the WP Customer Reviews plugin for WordPress, developed by bompus. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. Specifically, the flaw exists in the ajax_enabled_posts function of the plugin in all versions up to and including 3.6.6. This function improperly handles authorization checks, allowing authenticated users with limited privileges to access sensitive information that should otherwise be restricted. The exposed data includes post titles and slugs, not only for publicly available posts but also for protected and trashed posts and pages, as well as other post types such as galleries. This leakage of sensitive metadata could aid attackers in reconnaissance activities, potentially facilitating further targeted attacks or data harvesting. The vulnerability requires the attacker to be authenticated, but no user interaction is needed beyond that. The CVSS v3.1 base score is 4.3, reflecting a network attack vector with low complexity, requiring privileges but no user interaction, and resulting in limited confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild, and no official patches or updates have been linked yet, indicating that mitigation may require manual intervention or plugin updates once available.
Potential Impact
For European organizations using WordPress sites with the WP Customer Reviews plugin, this vulnerability poses a risk of sensitive information exposure. Although the data exposed is limited to post metadata (titles and slugs), the inclusion of protected and trashed content could reveal internal or confidential information not intended for public or broad internal access. This could undermine privacy policies and data protection regulations such as GDPR if the exposed data includes personal or sensitive content. Additionally, attackers could use the leaked information to map site structure, identify valuable content, or craft more effective phishing or social engineering attacks targeting the organization. While the vulnerability does not directly allow data modification or service disruption, the confidentiality breach could have reputational and compliance consequences. The requirement for authentication limits the attack surface to users who have some level of access, but in environments where user accounts are numerous or less strictly controlled, the risk increases. European organizations with public-facing WordPress sites that rely on this plugin for customer reviews should be particularly vigilant, especially those in sectors handling sensitive customer data such as finance, healthcare, and e-commerce.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are running the affected versions of the WP Customer Reviews plugin (up to 3.6.6). Immediate steps include restricting plugin usage to trusted users only and auditing user privileges to minimize the number of authenticated users who could exploit this flaw. Organizations should monitor access logs for unusual activity related to AJAX requests targeting the ajax_enabled_posts function. Until an official patch is released, consider disabling or removing the plugin if feasible or replacing it with alternative customer review solutions that have no known vulnerabilities. Implementing Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests related to this plugin can provide an additional layer of defense. Regularly updating WordPress core and plugins, and subscribing to vulnerability advisories from trusted sources, will ensure timely application of patches once available. Finally, conduct internal security awareness to ensure users understand the risks of privilege misuse and enforce strong authentication and access control policies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2023-08-31T17:55:27.619Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f581b0bd07c3938a76b
Added to database: 6/10/2025, 6:54:16 PM
Last enriched: 7/11/2025, 2:17:30 AM
Last updated: 7/30/2025, 7:48:01 PM
Views: 11
Related Threats
CVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
UnknownCVE-2025-8959: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Shared library
HighCVE-2025-44201
LowCVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.