Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7390: CWE-862 Missing Authorization in starkinfo WP Testimonial Widget

0
Medium
VulnerabilityCVE-2024-7390cvecve-2024-7390cwe-862
Published: Wed Aug 21 2024 (08/21/2024, 05:30:20 UTC)
Source: CVE Database V5
Vendor/Project: starkinfo
Product: WP Testimonial Widget

Description

CVE-2024-7390 is a medium severity vulnerability in the WP Testimonial Widget WordPress plugin, affecting all versions up to 3. 0. The flaw arises from a missing authorization check in the fnSaveTestimonailOrder function, allowing unauthenticated attackers to modify the order of testimonials. While this does not impact confidentiality or availability, it compromises data integrity by permitting unauthorized changes. Exploitation requires no authentication or user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize applying patches or implementing access controls to prevent unauthorized testimonial modifications. The vulnerability primarily affects WordPress sites using this specific plugin, with higher risk in countries where WordPress has significant market share and where the plugin is popular. The overall severity is medium due to limited impact scope and lack of authentication requirements.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:37:23 UTC

Technical Analysis

CVE-2024-7390 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Testimonial Widget plugin for WordPress, maintained by starkinfo. The issue exists in the fnSaveTestimonailOrder function, which lacks proper capability checks to verify if the user has the necessary permissions to modify testimonial order data. This missing authorization allows unauthenticated attackers to remotely invoke this function and reorder testimonials arbitrarily. Since the vulnerability affects all versions up to and including 3.0, any site running these versions is at risk. The vulnerability does not expose sensitive data (no confidentiality impact) nor does it affect system availability. However, it compromises data integrity by allowing unauthorized changes to testimonial content order, which could be leveraged to manipulate site presentation or reputation. The CVSS v3.1 score is 5.3 (medium), reflecting the ease of exploitation (no privileges or user interaction required) but limited impact scope. No patches or known exploits have been reported at the time of publication, but the risk remains for sites that do not implement mitigations. The vulnerability is network exploitable and affects publicly accessible WordPress installations using the plugin.

Potential Impact

The primary impact of CVE-2024-7390 is unauthorized modification of testimonial order on affected WordPress sites. While this does not directly compromise sensitive user data or site availability, it undermines the integrity of displayed content, potentially damaging the credibility and trustworthiness of the website. Attackers could reorder testimonials to promote fraudulent or misleading content, negatively influencing visitors’ perception. For organizations relying on testimonials as part of their marketing or reputation management, this could lead to reputational harm and loss of customer trust. Additionally, if combined with other vulnerabilities or social engineering, it could be part of a larger attack chain. Since the vulnerability requires no authentication and is remotely exploitable, it increases the attack surface for opportunistic attackers. However, the impact is limited to the testimonial widget and does not affect core WordPress functionality or other plugins.

Mitigation Recommendations

1. Immediately update the WP Testimonial Widget plugin to a version that includes proper authorization checks once a patch is released by the vendor. 2. Until an official patch is available, restrict access to the WordPress admin AJAX endpoint or the specific fnSaveTestimonailOrder function by implementing web application firewall (WAF) rules that block unauthorized requests targeting this function. 3. Limit plugin usage to trusted administrators only and disable or remove the plugin if it is not essential. 4. Monitor web server and WordPress logs for suspicious POST requests attempting to invoke fnSaveTestimonailOrder without authentication. 5. Employ principle of least privilege on WordPress user roles to minimize potential damage from compromised accounts. 6. Regularly audit and verify testimonial content integrity to detect unauthorized changes promptly. 7. Consider implementing additional security plugins that enforce capability checks or harden AJAX endpoints. 8. Educate site administrators about the risk and encourage prompt patching and monitoring.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-01T19:10:32.040Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c16b7ef31ef0b55fc49

Added to database: 2/25/2026, 9:39:34 PM

Last enriched: 2/26/2026, 3:37:23 AM

Last updated: 2/26/2026, 9:39:20 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats