Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14426: CWE-862 Missing Authorization in wpchill Strong Testimonials

0
Medium
VulnerabilityCVE-2025-14426cvecve-2025-14426cwe-862
Published: Tue Dec 30 2025 (12/30/2025, 12:22:35 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Strong Testimonials

Description

The Strong Testimonials plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check in the 'edit_rating' function in all versions up to, and including, 3.2.18. This makes it possible for authenticated attackers with Contributor-level access and above to modify or delete the rating meta on any testimonial post, including those created by other users, by reusing a valid nonce obtained from their own testimonial edit screen.

AI-Powered Analysis

AILast updated: 12/30/2025, 22:58:26 UTC

Technical Analysis

CVE-2025-14426 is a vulnerability identified in the Strong Testimonials plugin for WordPress, affecting all versions up to and including 3.2.18. The root cause is a missing authorization check (CWE-862) in the 'edit_rating' function, which fails to verify whether the authenticated user has the appropriate capabilities to modify rating metadata on testimonial posts. This flaw allows any authenticated user with at least Contributor-level privileges to alter or delete the rating meta on testimonial posts created by other users. The attack vector involves reusing a valid nonce obtained from the attacker's own testimonial edit screen, enabling unauthorized modification without additional user interaction. The vulnerability impacts data integrity by allowing unauthorized changes but does not compromise confidentiality or availability. The CVSS 3.1 base score is 4.3, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges, and no user interaction. No official patches or updates have been published at the time of disclosure, and no known exploits have been reported in the wild. The vulnerability is significant for WordPress sites relying on Strong Testimonials for user-generated content, especially where Contributor roles are assigned liberally.

Potential Impact

For European organizations, this vulnerability primarily threatens the integrity of testimonial data on WordPress sites using the Strong Testimonials plugin. Unauthorized modification or deletion of ratings can undermine trust in user feedback, potentially damaging brand reputation and customer confidence. While the vulnerability does not expose sensitive information or disrupt service availability, the ability for lower-privileged users to alter content belonging to others can facilitate internal abuse or sabotage. Organizations with public-facing testimonial sections, especially in sectors like e-commerce, hospitality, or professional services, may face reputational risks. Additionally, if testimonial data is used in automated decision-making or marketing, data manipulation could lead to incorrect business insights or customer targeting. Since exploitation requires authenticated access with Contributor-level privileges, the impact is mitigated by proper user role management but remains a concern where such roles are broadly assigned.

Mitigation Recommendations

European organizations should immediately audit WordPress user roles and permissions to ensure that Contributor-level access is granted only to trusted users. Restricting the Contributor role or replacing it with more limited custom roles can reduce exposure. Until an official patch is released, consider temporarily disabling the Strong Testimonials plugin or restricting access to testimonial editing screens via additional access controls or security plugins that enforce capability checks. Implement logging and monitoring of testimonial rating modifications to detect unauthorized changes promptly. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the 'edit_rating' function or nonce reuse patterns. Regularly update WordPress core and plugins and subscribe to vendor advisories for timely patch deployment once available. Conduct security awareness training for site administrators and contributors about the risks of privilege misuse.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T01:58:29.132Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450aedb813ff03e2bec24

Added to database: 12/30/2025, 10:22:38 PM

Last enriched: 12/30/2025, 10:58:26 PM

Last updated: 2/6/2026, 12:42:01 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats