CVE-2024-7390: CWE-862 Missing Authorization in starkinfo WP Testimonial Widget
CVE-2024-7390 is a medium severity vulnerability in the WP Testimonial Widget WordPress plugin, affecting all versions up to 3. 0. The flaw arises from a missing authorization check in the fnSaveTestimonailOrder function, allowing unauthenticated attackers to modify the order of testimonials. While this does not impact confidentiality or availability, it compromises data integrity by permitting unauthorized changes. Exploitation requires no authentication or user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize applying patches or implementing access controls to prevent unauthorized testimonial modifications. The vulnerability primarily affects WordPress sites using this specific plugin, with higher risk in countries where WordPress has significant market share and where the plugin is popular. The overall severity is medium due to limited impact scope and lack of authentication requirements.
AI Analysis
Technical Summary
CVE-2024-7390 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Testimonial Widget plugin for WordPress, maintained by starkinfo. The issue exists in the fnSaveTestimonailOrder function, which lacks proper capability checks to verify if the user has the necessary permissions to modify testimonial order data. This missing authorization allows unauthenticated attackers to remotely invoke this function and reorder testimonials arbitrarily. Since the vulnerability affects all versions up to and including 3.0, any site running these versions is at risk. The vulnerability does not expose sensitive data (no confidentiality impact) nor does it affect system availability. However, it compromises data integrity by allowing unauthorized changes to testimonial content order, which could be leveraged to manipulate site presentation or reputation. The CVSS v3.1 score is 5.3 (medium), reflecting the ease of exploitation (no privileges or user interaction required) but limited impact scope. No patches or known exploits have been reported at the time of publication, but the risk remains for sites that do not implement mitigations. The vulnerability is network exploitable and affects publicly accessible WordPress installations using the plugin.
Potential Impact
The primary impact of CVE-2024-7390 is unauthorized modification of testimonial order on affected WordPress sites. While this does not directly compromise sensitive user data or site availability, it undermines the integrity of displayed content, potentially damaging the credibility and trustworthiness of the website. Attackers could reorder testimonials to promote fraudulent or misleading content, negatively influencing visitors’ perception. For organizations relying on testimonials as part of their marketing or reputation management, this could lead to reputational harm and loss of customer trust. Additionally, if combined with other vulnerabilities or social engineering, it could be part of a larger attack chain. Since the vulnerability requires no authentication and is remotely exploitable, it increases the attack surface for opportunistic attackers. However, the impact is limited to the testimonial widget and does not affect core WordPress functionality or other plugins.
Mitigation Recommendations
1. Immediately update the WP Testimonial Widget plugin to a version that includes proper authorization checks once a patch is released by the vendor. 2. Until an official patch is available, restrict access to the WordPress admin AJAX endpoint or the specific fnSaveTestimonailOrder function by implementing web application firewall (WAF) rules that block unauthorized requests targeting this function. 3. Limit plugin usage to trusted administrators only and disable or remove the plugin if it is not essential. 4. Monitor web server and WordPress logs for suspicious POST requests attempting to invoke fnSaveTestimonailOrder without authentication. 5. Employ principle of least privilege on WordPress user roles to minimize potential damage from compromised accounts. 6. Regularly audit and verify testimonial content integrity to detect unauthorized changes promptly. 7. Consider implementing additional security plugins that enforce capability checks or harden AJAX endpoints. 8. Educate site administrators about the risk and encourage prompt patching and monitoring.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-7390: CWE-862 Missing Authorization in starkinfo WP Testimonial Widget
Description
CVE-2024-7390 is a medium severity vulnerability in the WP Testimonial Widget WordPress plugin, affecting all versions up to 3. 0. The flaw arises from a missing authorization check in the fnSaveTestimonailOrder function, allowing unauthenticated attackers to modify the order of testimonials. While this does not impact confidentiality or availability, it compromises data integrity by permitting unauthorized changes. Exploitation requires no authentication or user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize applying patches or implementing access controls to prevent unauthorized testimonial modifications. The vulnerability primarily affects WordPress sites using this specific plugin, with higher risk in countries where WordPress has significant market share and where the plugin is popular. The overall severity is medium due to limited impact scope and lack of authentication requirements.
AI-Powered Analysis
Technical Analysis
CVE-2024-7390 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Testimonial Widget plugin for WordPress, maintained by starkinfo. The issue exists in the fnSaveTestimonailOrder function, which lacks proper capability checks to verify if the user has the necessary permissions to modify testimonial order data. This missing authorization allows unauthenticated attackers to remotely invoke this function and reorder testimonials arbitrarily. Since the vulnerability affects all versions up to and including 3.0, any site running these versions is at risk. The vulnerability does not expose sensitive data (no confidentiality impact) nor does it affect system availability. However, it compromises data integrity by allowing unauthorized changes to testimonial content order, which could be leveraged to manipulate site presentation or reputation. The CVSS v3.1 score is 5.3 (medium), reflecting the ease of exploitation (no privileges or user interaction required) but limited impact scope. No patches or known exploits have been reported at the time of publication, but the risk remains for sites that do not implement mitigations. The vulnerability is network exploitable and affects publicly accessible WordPress installations using the plugin.
Potential Impact
The primary impact of CVE-2024-7390 is unauthorized modification of testimonial order on affected WordPress sites. While this does not directly compromise sensitive user data or site availability, it undermines the integrity of displayed content, potentially damaging the credibility and trustworthiness of the website. Attackers could reorder testimonials to promote fraudulent or misleading content, negatively influencing visitors’ perception. For organizations relying on testimonials as part of their marketing or reputation management, this could lead to reputational harm and loss of customer trust. Additionally, if combined with other vulnerabilities or social engineering, it could be part of a larger attack chain. Since the vulnerability requires no authentication and is remotely exploitable, it increases the attack surface for opportunistic attackers. However, the impact is limited to the testimonial widget and does not affect core WordPress functionality or other plugins.
Mitigation Recommendations
1. Immediately update the WP Testimonial Widget plugin to a version that includes proper authorization checks once a patch is released by the vendor. 2. Until an official patch is available, restrict access to the WordPress admin AJAX endpoint or the specific fnSaveTestimonailOrder function by implementing web application firewall (WAF) rules that block unauthorized requests targeting this function. 3. Limit plugin usage to trusted administrators only and disable or remove the plugin if it is not essential. 4. Monitor web server and WordPress logs for suspicious POST requests attempting to invoke fnSaveTestimonailOrder without authentication. 5. Employ principle of least privilege on WordPress user roles to minimize potential damage from compromised accounts. 6. Regularly audit and verify testimonial content integrity to detect unauthorized changes promptly. 7. Consider implementing additional security plugins that enforce capability checks or harden AJAX endpoints. 8. Educate site administrators about the risk and encourage prompt patching and monitoring.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-08-01T19:10:32.040Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c16b7ef31ef0b55fc49
Added to database: 2/25/2026, 9:39:34 PM
Last enriched: 2/26/2026, 3:37:23 AM
Last updated: 2/26/2026, 9:39:20 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.