Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3609: CWE-862 Missing Authorization in reviewx ReviewX – Multi-criteria Rating & Reviews for WooCommerce

0
Medium
VulnerabilityCVE-2024-3609cvecve-2024-3609cwe-862
Published: Thu May 16 2024 (05/16/2024, 20:31:04 UTC)
Source: CVE Database V5
Vendor/Project: reviewx
Product: ReviewX – Multi-criteria Rating & Reviews for WooCommerce

Description

CVE-2024-3609 is a medium severity vulnerability in the ReviewX – Multi-criteria Rating & Reviews for WooCommerce WordPress plugin. It arises from a missing authorization check in the reviewx_remove_guest_image function, allowing authenticated users with subscriber-level access or higher to delete attachments without proper permissions. The flaw affects all versions up to and including 1. 6. 27. Exploitation requires no user interaction beyond authentication, and the impact is limited to integrity loss through unauthorized deletion of attachments. There are no known exploits in the wild currently. Organizations using this plugin should prioritize updating or implementing access controls to prevent unauthorized data deletion. The vulnerability primarily threatens websites running WooCommerce with the ReviewX plugin, which are common in e-commerce sectors worldwide, especially in countries with large WordPress user bases. Given the moderate CVSS score of 4.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:19:42 UTC

Technical Analysis

CVE-2024-3609 is a vulnerability classified under CWE-862 (Missing Authorization) found in the ReviewX – Multi-criteria Rating & Reviews for WooCommerce plugin for WordPress. The issue stems from the absence of a capability check in the reviewx_remove_guest_image function, which is responsible for deleting guest user images attached to reviews. This missing authorization allows any authenticated user with subscriber-level privileges or higher to invoke this function and delete attachments arbitrarily. Since WordPress subscriber roles are commonly assigned to registered users with minimal privileges, this vulnerability significantly lowers the barrier for exploitation. The flaw affects all versions of the plugin up to and including 1.6.27. The CVSS v3.1 base score is 4.3, reflecting a medium severity due to the network attack vector, low attack complexity, and the requirement for privileges but no user interaction. The vulnerability impacts the integrity of stored data by enabling unauthorized deletion but does not affect confidentiality or availability directly. No patches or fixes are currently linked in the provided data, and no known exploits have been reported in the wild. The vulnerability is particularly relevant for e-commerce websites using WooCommerce with the ReviewX plugin, where review images and attachments are integral to user-generated content and trustworthiness.

Potential Impact

The primary impact of CVE-2024-3609 is unauthorized deletion of attachments related to user reviews, which compromises data integrity. For organizations, this can result in loss of valuable user-generated content, undermining customer trust and potentially affecting sales and reputation. Although the vulnerability does not directly affect confidentiality or availability, the deletion of review images can degrade the user experience and the perceived reliability of the e-commerce platform. Attackers with subscriber-level access, which is relatively easy to obtain, can exploit this flaw to remove legitimate content or conduct targeted attacks against specific attachments. This could be leveraged in broader social engineering or reputation damage campaigns. The scope is limited to sites using the vulnerable plugin, but given WooCommerce's popularity and the widespread use of ReviewX, the number of affected sites could be substantial. Organizations relying on this plugin for customer reviews should consider the risk of data tampering and the potential operational impact of content loss.

Mitigation Recommendations

To mitigate CVE-2024-3609, organizations should first verify if they are using the ReviewX plugin version 1.6.27 or earlier. Immediate mitigation includes restricting subscriber-level user capabilities to prevent unauthorized access or deletion of attachments. Administrators should audit user roles and permissions, ensuring that only trusted users have subscriber or higher access. If possible, temporarily disable the plugin or the affected functionality until a patch is released. Monitoring and logging deletion events related to review attachments can help detect exploitation attempts. Implementing a Web Application Firewall (WAF) with custom rules to block suspicious requests targeting the reviewx_remove_guest_image function may reduce risk. Regular backups of review data and attachments are essential to recover from any unauthorized deletions. Organizations should stay alert for official patches or updates from the vendor and apply them promptly once available. Additionally, consider isolating or sandboxing user-generated content to limit the impact of unauthorized deletions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-10T17:31:53.592Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c97b7ef31ef0b56695e

Added to database: 2/25/2026, 9:41:43 PM

Last enriched: 2/26/2026, 6:19:42 AM

Last updated: 2/26/2026, 11:14:32 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats