Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14426: CWE-862 Missing Authorization in wpchill Strong Testimonials

0
Medium
VulnerabilityCVE-2025-14426cvecve-2025-14426cwe-862
Published: Tue Dec 30 2025 (12/30/2025, 12:22:35 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Strong Testimonials

Description

The Strong Testimonials plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check in the 'edit_rating' function in all versions up to, and including, 3.2.18. This makes it possible for authenticated attackers with Contributor-level access and above to modify or delete the rating meta on any testimonial post, including those created by other users, by reusing a valid nonce obtained from their own testimonial edit screen.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:14:17 UTC

Technical Analysis

CVE-2025-14426 is a vulnerability in the Strong Testimonials plugin for WordPress, identified as CWE-862 (Missing Authorization). The flaw exists in the 'edit_rating' function, which lacks proper capability checks before allowing modification of rating metadata on testimonial posts. This means that any authenticated user with Contributor-level access or higher can manipulate or delete ratings on testimonial posts created by other users. The attack vector involves reusing a valid nonce obtained from the attacker's own testimonial edit screen to perform unauthorized edits on other users' testimonial ratings. The vulnerability affects all versions up to and including 3.2.18 of the plugin. The CVSS v3.1 score is 4.3 (medium), reflecting that the attack requires network access, low attack complexity, privileges (Contributor or above), no user interaction, and impacts integrity only, without affecting confidentiality or availability. No patches or known exploits are currently available. The vulnerability could be exploited to undermine the integrity of testimonial data, potentially damaging trust in user-generated content on affected sites.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification or deletion of testimonial rating metadata, which compromises data integrity. Organizations relying on Strong Testimonials to showcase user feedback or ratings may experience reputational damage if attackers manipulate testimonial scores to mislead visitors or discredit users. While confidentiality and availability are not affected, the integrity breach can erode trust in the authenticity of testimonials, impacting marketing and customer relations. Attackers with Contributor-level access can exploit this vulnerability remotely without user interaction, increasing the risk in environments where Contributor roles are widely assigned. The scope includes all WordPress sites using the affected plugin versions, which can be substantial given WordPress's global popularity. Although no known exploits exist yet, the vulnerability could be leveraged in targeted attacks against organizations that rely heavily on testimonial content for business credibility.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit and restrict Contributor-level access to trusted users only, minimizing the number of accounts that can exploit this flaw. Temporarily disabling the Strong Testimonials plugin or removing it until a security patch is released is advisable for high-risk environments. Site administrators should monitor testimonial rating changes for suspicious activity and consider implementing additional logging and alerting on testimonial metadata modifications. Applying the principle of least privilege to user roles and capabilities within WordPress can reduce exposure. Once a patch is available, prompt updating of the plugin to a fixed version is critical. Additionally, developers and site owners can implement custom authorization checks or filters to enforce capability verification on the 'edit_rating' function as an interim protective measure. Regular backups of testimonial data will help restore integrity if unauthorized changes occur.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T01:58:29.132Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450aedb813ff03e2bec24

Added to database: 12/30/2025, 10:22:38 PM

Last enriched: 2/27/2026, 11:14:17 AM

Last updated: 3/26/2026, 4:38:51 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses