PT-2026-39948 · Videowhisper · The Rate Star Review Vote – Ajax Reviews
Cipher Forensic
·
Published
2026-05-12
·
Updated
2026-05-12
·
CVE-2026-4301
CVSS v3.1
4.3
Medium
| Vector | AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
The Rate Star Review Vote - AJAX Reviews, Votes, Star Ratings plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. The vwrsr review() AJAX handler lacks both capability checks and nonce verification. The only access control is an is user logged in() check. When the 'form' parameter is set to 'update', the function takes an arbitrary post ID from the user-supplied 'rating id' GET parameter, sets it as the post ID in the update array, and passes it directly to wp update post(). This overwrites the target post's title, content, author (changed to the attacker's user ID), post type (changed to the plugin's custom post type, default 'review'), and status. Additionally, update post meta() is called on the arbitrary post ID at lines 758-763, modifying its metadata. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the title, content, author, post type, and metadata of arbitrary posts and pages on the site via the 'rating id' parameter, effectively allowing full post content takeover.
Fix
Missing Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
The Rate Star Review Vote – Ajax Reviews