CVE-2025-10734: CWE-922 Insecure Storage of Sensitive Information in reviewx ReviewX – Multi-Criteria Reviews for WooCommerce with Google Reviews & Schema
The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.12 via the syncedData function. This makes it possible for unauthenticated attackers to extract sensitive data including user names, emails, phone numbers, addresses.
AI Analysis
Technical Summary
CVE-2025-10734 identifies a vulnerability classified under CWE-922 (Insecure Storage of Sensitive Information) in the ReviewX – Multi-Criteria Reviews for WooCommerce with Google Reviews & Schema WordPress plugin. This vulnerability exists in all versions up to and including 2.2.12. The root cause is improper handling of sensitive user data within the syncedData function, which allows unauthenticated attackers to retrieve sensitive information such as user names, email addresses, phone numbers, and physical addresses. The flaw arises because the plugin exposes this data without adequate access controls or encryption, enabling remote attackers to access it over the network without authentication or user interaction. The vulnerability affects the confidentiality of user data but does not impact data integrity or system availability. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and only confidentiality is impacted (C:L). No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability poses a significant privacy risk to users of affected e-commerce sites, potentially leading to data leakage and privacy violations. The plugin is widely used in WooCommerce-based WordPress e-commerce platforms, which are popular globally, especially in countries with high WordPress adoption. The vulnerability underscores the importance of secure coding practices around sensitive data storage and access control in WordPress plugins.
Potential Impact
The primary impact of CVE-2025-10734 is the unauthorized disclosure of sensitive user information, including personally identifiable information (PII) such as names, emails, phone numbers, and addresses. This exposure can lead to privacy violations, identity theft, phishing attacks, and targeted social engineering campaigns against affected users. For organizations, the data leakage can result in reputational damage, loss of customer trust, and potential regulatory penalties under data protection laws such as GDPR or CCPA. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely and at scale, increasing the risk of mass data exposure. However, the vulnerability does not allow attackers to modify data or disrupt service, limiting the impact to confidentiality only. E-commerce businesses relying on the ReviewX plugin are at particular risk, as their customer databases may be exposed. The absence of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and sensitive nature of the data make this a significant concern for organizations worldwide.
Mitigation Recommendations
1. Immediate mitigation involves updating the ReviewX plugin to a patched version once available. Since no patch links are currently provided, organizations should monitor vendor advisories closely. 2. Until a patch is released, restrict access to the syncedData function endpoint by implementing web application firewall (WAF) rules to block unauthenticated requests targeting this function. 3. Employ network-level access controls to limit exposure of the WordPress admin and plugin endpoints to trusted IP addresses only. 4. Review and audit all plugins for unnecessary data exposure and disable or remove plugins that are not essential. 5. Implement strict role-based access controls (RBAC) within WordPress to minimize data access. 6. Monitor logs for unusual access patterns or repeated requests to the syncedData endpoint. 7. Educate development teams on secure coding practices, especially regarding sensitive data handling and access control. 8. Consider encrypting sensitive data at rest and in transit within the application to reduce impact if exposed. 9. Conduct regular security assessments and penetration testing focused on plugin vulnerabilities. 10. Prepare incident response plans for potential data breaches involving customer PII.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan, Italy, Spain
CVE-2025-10734: CWE-922 Insecure Storage of Sensitive Information in reviewx ReviewX – Multi-Criteria Reviews for WooCommerce with Google Reviews & Schema
Description
The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.12 via the syncedData function. This makes it possible for unauthenticated attackers to extract sensitive data including user names, emails, phone numbers, addresses.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10734 identifies a vulnerability classified under CWE-922 (Insecure Storage of Sensitive Information) in the ReviewX – Multi-Criteria Reviews for WooCommerce with Google Reviews & Schema WordPress plugin. This vulnerability exists in all versions up to and including 2.2.12. The root cause is improper handling of sensitive user data within the syncedData function, which allows unauthenticated attackers to retrieve sensitive information such as user names, email addresses, phone numbers, and physical addresses. The flaw arises because the plugin exposes this data without adequate access controls or encryption, enabling remote attackers to access it over the network without authentication or user interaction. The vulnerability affects the confidentiality of user data but does not impact data integrity or system availability. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and only confidentiality is impacted (C:L). No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability poses a significant privacy risk to users of affected e-commerce sites, potentially leading to data leakage and privacy violations. The plugin is widely used in WooCommerce-based WordPress e-commerce platforms, which are popular globally, especially in countries with high WordPress adoption. The vulnerability underscores the importance of secure coding practices around sensitive data storage and access control in WordPress plugins.
Potential Impact
The primary impact of CVE-2025-10734 is the unauthorized disclosure of sensitive user information, including personally identifiable information (PII) such as names, emails, phone numbers, and addresses. This exposure can lead to privacy violations, identity theft, phishing attacks, and targeted social engineering campaigns against affected users. For organizations, the data leakage can result in reputational damage, loss of customer trust, and potential regulatory penalties under data protection laws such as GDPR or CCPA. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely and at scale, increasing the risk of mass data exposure. However, the vulnerability does not allow attackers to modify data or disrupt service, limiting the impact to confidentiality only. E-commerce businesses relying on the ReviewX plugin are at particular risk, as their customer databases may be exposed. The absence of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and sensitive nature of the data make this a significant concern for organizations worldwide.
Mitigation Recommendations
1. Immediate mitigation involves updating the ReviewX plugin to a patched version once available. Since no patch links are currently provided, organizations should monitor vendor advisories closely. 2. Until a patch is released, restrict access to the syncedData function endpoint by implementing web application firewall (WAF) rules to block unauthenticated requests targeting this function. 3. Employ network-level access controls to limit exposure of the WordPress admin and plugin endpoints to trusted IP addresses only. 4. Review and audit all plugins for unnecessary data exposure and disable or remove plugins that are not essential. 5. Implement strict role-based access controls (RBAC) within WordPress to minimize data access. 6. Monitor logs for unusual access patterns or repeated requests to the syncedData endpoint. 7. Educate development teams on secure coding practices, especially regarding sensitive data handling and access control. 8. Consider encrypting sensitive data at rest and in transit within the application to reduce impact if exposed. 9. Conduct regular security assessments and penetration testing focused on plugin vulnerabilities. 10. Prepare incident response plans for potential data breaches involving customer PII.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-19T14:55:16.957Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c0d39df4197a8e3b12da1d
Added to database: 3/23/2026, 5:46:05 AM
Last enriched: 3/23/2026, 6:03:29 AM
Last updated: 3/24/2026, 6:51:01 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.