CVE-2025-3063: CWE-862 Missing Authorization in shopperapprovedapp Shopper Approved Reviews
The Shopper Approved Reviews plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ajax_callback_update_sa_option() function in versions 2.0 to 2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
AI Analysis
Technical Summary
The Shopper Approved Reviews plugin for WordPress, specifically versions 2.0 and 2.1, contains a critical vulnerability identified as CVE-2025-3063. This vulnerability is classified under CWE-862 (Missing Authorization) and arises because the ajax_callback_update_sa_option() function lacks proper capability checks. As a result, any authenticated user with at least Subscriber-level privileges can invoke this AJAX callback to update arbitrary options within the WordPress site. The exploit path involves modifying the 'default_role' option to 'administrator' and enabling user registration, which allows an attacker to create new administrative accounts without legitimate authorization. This effectively leads to privilege escalation from a low-privilege user to a full administrator, compromising the entire site. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication, and it affects the confidentiality, integrity, and availability of the affected WordPress installations. The CVSS v3.1 base score is 8.8, reflecting high severity due to the ease of exploitation and the critical impact on site security. No patches or official fixes are currently linked, and no active exploits have been reported in the wild as of the publication date.
Potential Impact
The exploitation of CVE-2025-3063 can have severe consequences for organizations running the affected Shopper Approved Reviews plugin. Attackers gaining administrative access can fully control the WordPress site, leading to data breaches, defacement, malware implantation, or use of the site as a pivot point for further network attacks. Confidentiality is compromised as sensitive user and business data may be accessed or exfiltrated. Integrity is at risk because attackers can alter site content, configurations, and user roles. Availability may also be impacted if attackers disrupt site operations or deploy ransomware. Given WordPress's widespread use globally, this vulnerability can affect a broad range of organizations, from small businesses to large enterprises relying on Shopper Approved Reviews for customer feedback. The ease of exploitation by low-privilege authenticated users increases the risk, especially in environments where user registration or subscriber accounts are common or where insider threats exist.
Mitigation Recommendations
Organizations should immediately audit their WordPress sites for the presence of the Shopper Approved Reviews plugin versions 2.0 and 2.1 and disable or remove the plugin if patching is not yet available. If possible, restrict user registration and limit Subscriber-level accounts to trusted users only. Implement strict access controls and monitor for unusual changes to WordPress options, especially the 'default_role' setting. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized AJAX requests targeting the vulnerable function. Regularly review user roles and permissions to detect unauthorized privilege escalations. Additionally, consider isolating WordPress administrative interfaces behind VPNs or IP whitelisting to reduce exposure. Stay alert for official patches or updates from the vendor and apply them promptly once released. Conduct security awareness training to reduce risks from insider threats or compromised low-privilege accounts.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, Japan, Netherlands, South Africa
CVE-2025-3063: CWE-862 Missing Authorization in shopperapprovedapp Shopper Approved Reviews
Description
The Shopper Approved Reviews plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ajax_callback_update_sa_option() function in versions 2.0 to 2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Shopper Approved Reviews plugin for WordPress, specifically versions 2.0 and 2.1, contains a critical vulnerability identified as CVE-2025-3063. This vulnerability is classified under CWE-862 (Missing Authorization) and arises because the ajax_callback_update_sa_option() function lacks proper capability checks. As a result, any authenticated user with at least Subscriber-level privileges can invoke this AJAX callback to update arbitrary options within the WordPress site. The exploit path involves modifying the 'default_role' option to 'administrator' and enabling user registration, which allows an attacker to create new administrative accounts without legitimate authorization. This effectively leads to privilege escalation from a low-privilege user to a full administrator, compromising the entire site. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication, and it affects the confidentiality, integrity, and availability of the affected WordPress installations. The CVSS v3.1 base score is 8.8, reflecting high severity due to the ease of exploitation and the critical impact on site security. No patches or official fixes are currently linked, and no active exploits have been reported in the wild as of the publication date.
Potential Impact
The exploitation of CVE-2025-3063 can have severe consequences for organizations running the affected Shopper Approved Reviews plugin. Attackers gaining administrative access can fully control the WordPress site, leading to data breaches, defacement, malware implantation, or use of the site as a pivot point for further network attacks. Confidentiality is compromised as sensitive user and business data may be accessed or exfiltrated. Integrity is at risk because attackers can alter site content, configurations, and user roles. Availability may also be impacted if attackers disrupt site operations or deploy ransomware. Given WordPress's widespread use globally, this vulnerability can affect a broad range of organizations, from small businesses to large enterprises relying on Shopper Approved Reviews for customer feedback. The ease of exploitation by low-privilege authenticated users increases the risk, especially in environments where user registration or subscriber accounts are common or where insider threats exist.
Mitigation Recommendations
Organizations should immediately audit their WordPress sites for the presence of the Shopper Approved Reviews plugin versions 2.0 and 2.1 and disable or remove the plugin if patching is not yet available. If possible, restrict user registration and limit Subscriber-level accounts to trusted users only. Implement strict access controls and monitor for unusual changes to WordPress options, especially the 'default_role' setting. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized AJAX requests targeting the vulnerable function. Regularly review user roles and permissions to detect unauthorized privilege escalations. Additionally, consider isolating WordPress administrative interfaces behind VPNs or IP whitelisting to reduce exposure. Stay alert for official patches or updates from the vendor and apply them promptly once released. Conduct security awareness training to reduce risks from insider threats or compromised low-privilege accounts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-03-31T22:22:17.046Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b27b7ef31ef0b54ebc6
Added to database: 2/25/2026, 9:35:35 PM
Last enriched: 2/27/2026, 1:20:41 PM
Last updated: 4/12/2026, 5:11:57 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.