First published: Wed Apr 02 2025(Updated: )
The Shopper Approved Reviews plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ajax_callback_update_sa_option() function in versions 2.0 to 2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Shopper Approved Reviews | >=2.0<=2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-3063 is categorized as high due to the potential for privilege escalation and unauthorized data modification.
To fix CVE-2025-3063, update the Shopper Approved Reviews plugin to a version higher than 2.1 where the vulnerability has been addressed.
CVE-2025-3063 affects users of the Shopper Approved Reviews plugin for WordPress versions 2.0 to 2.1.
Exploiting CVE-2025-3063 could allow an authenticated attacker to modify data and escalate privileges within the WordPress site.
A temporary workaround for CVE-2025-3063 is to disable the Shopper Approved Reviews plugin until it can be updated to a secure version.