CVE-2023-7199: CWE-639 Authorization Bypass Through User-Controlled Key in Unknown Relevanssi
The Relevanssi WordPress plugin before 4.22.0, Relevanssi Premium WordPress plugin before 2.25.0 allows any unauthenticated user to read draft and private posts via a crafted request
AI Analysis
Technical Summary
CVE-2023-7199 is a medium-severity vulnerability affecting the Relevanssi WordPress plugin versions prior to 4.22.0 and Relevanssi Premium versions prior to 2.25.0. The vulnerability is classified under CWE-639, which involves authorization bypass through user-controlled keys. Specifically, this flaw allows any unauthenticated user to access draft and private posts by crafting a specially designed request. Normally, draft and private posts are restricted to authorized users only, but due to improper authorization checks in the affected plugin versions, these restrictions can be bypassed. The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, meaning an attacker can exploit it remotely over the internet. The CVSS v3.1 base score is 5.3 (medium), reflecting a low impact on confidentiality (partial disclosure of content), no impact on integrity or availability, and ease of exploitation due to lack of required privileges or user interaction. The vulnerability stems from the plugin's failure to properly validate user permissions before returning search results or content, allowing unauthorized disclosure of sensitive unpublished content. There are no known public exploits in the wild at the time of publication, and no official patches or updates are linked in the provided data, but upgrading to versions 4.22.0 or 2.25.0 and above is implied as the remediation path.
Potential Impact
For European organizations using WordPress sites with the Relevanssi plugin, this vulnerability poses a risk of unauthorized disclosure of sensitive internal content such as draft blog posts, internal announcements, or private communications. While the impact is limited to confidentiality and does not affect data integrity or system availability, the exposure of unpublished or private content can lead to reputational damage, leakage of sensitive business information, or violation of data privacy policies such as GDPR if personal data is inadvertently exposed. Organizations in sectors with strict confidentiality requirements—such as legal, financial, healthcare, and government—may face compliance risks if sensitive information is leaked. Additionally, attackers could use the disclosed information to facilitate further targeted attacks or social engineering campaigns. The fact that exploitation requires no authentication and no user interaction increases the risk, as automated scanning and exploitation attempts could be performed at scale. However, the lack of known exploits in the wild and the medium severity score suggest the threat is moderate but should be addressed promptly to prevent potential abuse.
Mitigation Recommendations
European organizations should immediately verify if their WordPress installations use the Relevanssi or Relevanssi Premium plugins and identify the plugin versions in use. The primary mitigation is to upgrade the plugin to version 4.22.0 or later for Relevanssi, and 2.25.0 or later for Relevanssi Premium, where the vulnerability is fixed. Until upgrades can be applied, organizations should consider disabling the plugin or restricting access to the WordPress search functionality provided by Relevanssi, especially for unauthenticated users. Implementing web application firewall (WAF) rules to detect and block suspicious crafted requests targeting the plugin’s search endpoints can provide temporary protection. Additionally, reviewing and tightening WordPress user role permissions and ensuring that draft and private posts are not inadvertently exposed through other plugins or themes is recommended. Regular security audits and monitoring of web server logs for unusual access patterns to draft/private content URLs can help detect exploitation attempts early. Organizations should also maintain an up-to-date inventory of plugins and monitor vulnerability disclosures to respond promptly to future threats.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-7199: CWE-639 Authorization Bypass Through User-Controlled Key in Unknown Relevanssi
Description
The Relevanssi WordPress plugin before 4.22.0, Relevanssi Premium WordPress plugin before 2.25.0 allows any unauthenticated user to read draft and private posts via a crafted request
AI-Powered Analysis
Technical Analysis
CVE-2023-7199 is a medium-severity vulnerability affecting the Relevanssi WordPress plugin versions prior to 4.22.0 and Relevanssi Premium versions prior to 2.25.0. The vulnerability is classified under CWE-639, which involves authorization bypass through user-controlled keys. Specifically, this flaw allows any unauthenticated user to access draft and private posts by crafting a specially designed request. Normally, draft and private posts are restricted to authorized users only, but due to improper authorization checks in the affected plugin versions, these restrictions can be bypassed. The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, meaning an attacker can exploit it remotely over the internet. The CVSS v3.1 base score is 5.3 (medium), reflecting a low impact on confidentiality (partial disclosure of content), no impact on integrity or availability, and ease of exploitation due to lack of required privileges or user interaction. The vulnerability stems from the plugin's failure to properly validate user permissions before returning search results or content, allowing unauthorized disclosure of sensitive unpublished content. There are no known public exploits in the wild at the time of publication, and no official patches or updates are linked in the provided data, but upgrading to versions 4.22.0 or 2.25.0 and above is implied as the remediation path.
Potential Impact
For European organizations using WordPress sites with the Relevanssi plugin, this vulnerability poses a risk of unauthorized disclosure of sensitive internal content such as draft blog posts, internal announcements, or private communications. While the impact is limited to confidentiality and does not affect data integrity or system availability, the exposure of unpublished or private content can lead to reputational damage, leakage of sensitive business information, or violation of data privacy policies such as GDPR if personal data is inadvertently exposed. Organizations in sectors with strict confidentiality requirements—such as legal, financial, healthcare, and government—may face compliance risks if sensitive information is leaked. Additionally, attackers could use the disclosed information to facilitate further targeted attacks or social engineering campaigns. The fact that exploitation requires no authentication and no user interaction increases the risk, as automated scanning and exploitation attempts could be performed at scale. However, the lack of known exploits in the wild and the medium severity score suggest the threat is moderate but should be addressed promptly to prevent potential abuse.
Mitigation Recommendations
European organizations should immediately verify if their WordPress installations use the Relevanssi or Relevanssi Premium plugins and identify the plugin versions in use. The primary mitigation is to upgrade the plugin to version 4.22.0 or later for Relevanssi, and 2.25.0 or later for Relevanssi Premium, where the vulnerability is fixed. Until upgrades can be applied, organizations should consider disabling the plugin or restricting access to the WordPress search functionality provided by Relevanssi, especially for unauthenticated users. Implementing web application firewall (WAF) rules to detect and block suspicious crafted requests targeting the plugin’s search endpoints can provide temporary protection. Additionally, reviewing and tightening WordPress user role permissions and ensuring that draft and private posts are not inadvertently exposed through other plugins or themes is recommended. Regular security audits and monitoring of web server logs for unusual access patterns to draft/private content URLs can help detect exploitation attempts early. Organizations should also maintain an up-to-date inventory of plugins and monitor vulnerability disclosures to respond promptly to future threats.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-01-02T12:00:34.810Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68387d4f182aa0cae28316b4
Added to database: 5/29/2025, 3:29:19 PM
Last enriched: 7/7/2025, 11:28:23 PM
Last updated: 7/30/2025, 8:08:50 PM
Views: 8
Related Threats
CVE-2025-8959: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Shared library
HighCVE-2025-44201
LowCVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumCVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.