Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8200: CWE-352 Cross-Site Request Forgery (CSRF) in smub Reviews Feed – Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More

0
Medium
VulnerabilityCVE-2024-8200cvecve-2024-8200cwe-352
Published: Tue Aug 27 2024 (08/27/2024, 15:32:31 UTC)
Source: CVE Database V5
Vendor/Project: smub
Product: Reviews Feed – Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More

Description

CVE-2024-8200 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the WordPress plugin 'Reviews Feed – Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More' in all versions up to 1. 1. 2. The flaw arises from missing or incorrect nonce validation in the 'update_api_key' function, allowing unauthenticated attackers to update the API key by tricking an administrator into clicking a malicious link. This vulnerability does not impact confidentiality or availability but can lead to integrity issues by unauthorized modification of API keys. Exploitation requires user interaction but no authentication, making it moderately easy to exploit. There are no known exploits in the wild currently, and no patches have been released yet. Organizations using this plugin should be aware of the risk of unauthorized API key changes, which could lead to further abuse or data manipulation. Mitigation involves applying nonce validation and restricting the update function to authenticated users only. Countries with significant WordPress usage and e-commerce or review-based websites are most at risk, including the United States, United Kingdom, Canada, Australia, Germany, France, and India.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:52:55 UTC

Technical Analysis

CVE-2024-8200 is a medium-severity CSRF vulnerability identified in the WordPress plugin 'Reviews Feed – Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More' (versions up to 1.1.2). The vulnerability stems from improper or missing nonce validation in the 'update_api_key' function, which is responsible for updating the API key used by the plugin to fetch and display customer reviews from third-party platforms. Because nonce validation is absent or incorrect, an attacker can craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link), causes the API key to be updated without the administrator's consent. This attack vector requires no prior authentication by the attacker but does require user interaction from a privileged user. The impact is limited to the integrity of the API key, which could be replaced with a malicious or attacker-controlled key, potentially enabling further abuse such as injecting fraudulent reviews or disrupting the review feed functionality. The vulnerability does not affect confidentiality or availability directly. No patches or fixes have been published at the time of disclosure, and no known exploits have been reported in the wild. The CVSS v3.1 base score is 4.3 (medium), reflecting the ease of exploitation and limited impact scope. The plugin is used by WordPress sites that integrate multiple review sources, making it relevant to businesses relying on customer testimonials for reputation management.

Potential Impact

The primary impact of this vulnerability is on the integrity of the affected WordPress sites' review feeds. Unauthorized modification of the API key could allow attackers to manipulate the source of reviews, potentially injecting false or misleading testimonials or disrupting the display of legitimate reviews. This can damage the reputation of affected businesses, erode customer trust, and impact revenue, especially for e-commerce and service-oriented websites relying heavily on customer feedback. While the vulnerability does not directly compromise user data confidentiality or site availability, the indirect effects on business credibility and user trust can be significant. Additionally, if attackers replace API keys with their own, they might gain further footholds or leverage the compromised site for additional attacks or misinformation campaigns. The requirement for administrator interaction limits the attack scope but does not eliminate risk, especially in environments with multiple administrators or less security-aware personnel.

Mitigation Recommendations

To mitigate this vulnerability, site administrators and plugin developers should implement proper nonce validation in the 'update_api_key' function to ensure that requests to update the API key are legitimate and originate from authorized users. This includes generating and verifying WordPress nonces for all state-changing operations. Additionally, restricting the update function to authenticated users with appropriate capabilities (e.g., administrators) is critical. Until an official patch is released, administrators should consider temporarily disabling the plugin or restricting administrative access to trusted personnel only. Monitoring administrative actions and reviewing API key changes can help detect suspicious activity. Employing web application firewalls (WAFs) with CSRF protection rules may provide additional defense. Regularly updating the plugin once a fix is available is essential. Educating administrators about the risks of clicking unknown or suspicious links can reduce the likelihood of successful social engineering exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-27T02:51:29.064Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c24b7ef31ef0b560654

Added to database: 2/25/2026, 9:39:48 PM

Last enriched: 2/26/2026, 3:52:55 AM

Last updated: 2/26/2026, 9:41:38 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats