Impact
This vulnerability arises from an authorization flaw in the updateComment mutation of WPGraphQL. Low‑privileged authenticated users can modify the moderation status of their own comments, bypassing the moderate_comments capability. Consequently, untrusted users can self‑approve comments, circumventing the site’s moderation workflow and potentially exposing the site to unwanted or malicious content.
Affected Systems
WordPress sites running the WPGraphQL plugin prior to version 2.10.0, such as 2.9.1, are affected. The issue is triggered through the GraphQL API whenever an authenticated user submits an updateComment mutation for a comment they own.
Risk and Exploitability
The vulnerability carries a CVSS score of 4.3, indicating moderate severity, and it requires only an authenticated user with comment posting rights to exploit it. No public exploits are listed in the KEV catalog, but the lack of a moderate_comments check means an attacker who can author a comment can elevate its status without further privileges. The attack vector is through the GraphQL updateComment mutation, and successful exploitation could undermine content moderation policies.
OpenCVE Enrichment