CVE-2026-4301
Received Received - Intake
Missing Authorization in Rate Star Review Vote WordPress Plugin

Publication date: 2026-05-12

Last updated on: 2026-05-12

Assigner: Wordfence

Description
The Rate Star Review Vote - AJAX Reviews, Votes, Star Ratings plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. The vwrsr_review() AJAX handler lacks both capability checks and nonce verification. The only access control is an is_user_logged_in() check. When the 'form' parameter is set to 'update', the function takes an arbitrary post ID from the user-supplied 'rating_id' GET parameter, sets it as the post ID in the update array, and passes it directly to wp_update_post(). This overwrites the target post's title, content, author (changed to the attacker's user ID), post_type (changed to the plugin's custom post type, default 'review'), and status. Additionally, update_post_meta() is called on the arbitrary post ID at lines 758-763, modifying its metadata. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the title, content, author, post type, and metadata of arbitrary posts and pages on the site via the 'rating_id' parameter, effectively allowing full post content takeover.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-12
Last Modified
2026-05-12
Generated
2026-05-12
AI Q&A
2026-05-12
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
rate_star_review ajax_reviews_votes_star_ratings to 1.6.4 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Rate Star Review Vote - AJAX Reviews, Votes, Star Ratings plugin for WordPress has a vulnerability called Missing Authorization in all versions up to and including 1.6.4.

Specifically, the vwrsr_review() AJAX handler does not properly check user capabilities or verify nonces, relying only on a check that the user is logged in.

When the 'form' parameter is set to 'update', the function accepts an arbitrary post ID from the user-supplied 'rating_id' parameter and uses it to update the post via wp_update_post().

This allows an authenticated attacker with Subscriber-level access or higher to modify the title, content, author (which is changed to the attacker's user ID), post type, and status of any post or page on the site.

Additionally, the attacker can modify the metadata of the arbitrary post via update_post_meta(), effectively allowing full takeover of post content.


How can this vulnerability impact me? :

This vulnerability allows authenticated users with low-level access (Subscriber and above) to modify any post or page on the WordPress site.

An attacker can change the title, content, author, post type, status, and metadata of arbitrary posts, which can lead to unauthorized content changes.

Such unauthorized modifications can result in defacement, misinformation, or insertion of malicious content, potentially damaging the site's integrity and reputation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart