Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10734: CWE-922 Insecure Storage of Sensitive Information in reviewx ReviewX – Multi-Criteria Reviews for WooCommerce with Google Reviews & Schema

0
Medium
VulnerabilityCVE-2025-10734cvecve-2025-10734cwe-922
Published: Mon Mar 23 2026 (03/23/2026, 05:29:39 UTC)
Source: CVE Database V5
Vendor/Project: reviewx
Product: ReviewX – Multi-Criteria Reviews for WooCommerce with Google Reviews & Schema

Description

The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.12 via the syncedData function. This makes it possible for unauthenticated attackers to extract sensitive data including user names, emails, phone numbers, addresses.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 06:03:29 UTC

Technical Analysis

CVE-2025-10734 identifies a vulnerability classified under CWE-922 (Insecure Storage of Sensitive Information) in the ReviewX – Multi-Criteria Reviews for WooCommerce with Google Reviews & Schema WordPress plugin. This vulnerability exists in all versions up to and including 2.2.12. The root cause is improper handling of sensitive user data within the syncedData function, which allows unauthenticated attackers to retrieve sensitive information such as user names, email addresses, phone numbers, and physical addresses. The flaw arises because the plugin exposes this data without adequate access controls or encryption, enabling remote attackers to access it over the network without authentication or user interaction. The vulnerability affects the confidentiality of user data but does not impact data integrity or system availability. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and only confidentiality is impacted (C:L). No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability poses a significant privacy risk to users of affected e-commerce sites, potentially leading to data leakage and privacy violations. The plugin is widely used in WooCommerce-based WordPress e-commerce platforms, which are popular globally, especially in countries with high WordPress adoption. The vulnerability underscores the importance of secure coding practices around sensitive data storage and access control in WordPress plugins.

Potential Impact

The primary impact of CVE-2025-10734 is the unauthorized disclosure of sensitive user information, including personally identifiable information (PII) such as names, emails, phone numbers, and addresses. This exposure can lead to privacy violations, identity theft, phishing attacks, and targeted social engineering campaigns against affected users. For organizations, the data leakage can result in reputational damage, loss of customer trust, and potential regulatory penalties under data protection laws such as GDPR or CCPA. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely and at scale, increasing the risk of mass data exposure. However, the vulnerability does not allow attackers to modify data or disrupt service, limiting the impact to confidentiality only. E-commerce businesses relying on the ReviewX plugin are at particular risk, as their customer databases may be exposed. The absence of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and sensitive nature of the data make this a significant concern for organizations worldwide.

Mitigation Recommendations

1. Immediate mitigation involves updating the ReviewX plugin to a patched version once available. Since no patch links are currently provided, organizations should monitor vendor advisories closely. 2. Until a patch is released, restrict access to the syncedData function endpoint by implementing web application firewall (WAF) rules to block unauthenticated requests targeting this function. 3. Employ network-level access controls to limit exposure of the WordPress admin and plugin endpoints to trusted IP addresses only. 4. Review and audit all plugins for unnecessary data exposure and disable or remove plugins that are not essential. 5. Implement strict role-based access controls (RBAC) within WordPress to minimize data access. 6. Monitor logs for unusual access patterns or repeated requests to the syncedData endpoint. 7. Educate development teams on secure coding practices, especially regarding sensitive data handling and access control. 8. Consider encrypting sensitive data at rest and in transit within the application to reduce impact if exposed. 9. Conduct regular security assessments and penetration testing focused on plugin vulnerabilities. 10. Prepare incident response plans for potential data breaches involving customer PII.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-09-19T14:55:16.957Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c0d39df4197a8e3b12da1d

Added to database: 3/23/2026, 5:46:05 AM

Last enriched: 3/23/2026, 6:03:29 AM

Last updated: 3/24/2026, 6:51:01 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses