Description
The Rate Star Review Vote - AJAX Reviews, Votes, Star Ratings plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. The vwrsr_review() AJAX handler lacks both capability checks and nonce verification. The only access control is an is_user_logged_in() check. When the 'form' parameter is set to 'update', the function takes an arbitrary post ID from the user-supplied 'rating_id' GET parameter, sets it as the post ID in the update array, and passes it directly to wp_update_post(). This overwrites the target post's title, content, author (changed to the attacker's user ID), post_type (changed to the plugin's custom post type, default 'review'), and status. Additionally, update_post_meta() is called on the arbitrary post ID at lines 758-763, modifying its metadata. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the title, content, author, post type, and metadata of arbitrary posts and pages on the site via the 'rating_id' parameter, effectively allowing full post content takeover.
Published: 2026-05-12
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Rate Star Review Vote plugin for WordPress contains a missing authorization flaw in versions up to 1.6.4. The AJAX handler responsible for review voting does not perform capability checks or nonce verification and only verifies that a user is logged in. When the form parameter is set to update, the handler accepts an arbitrary post identifier from the rating_id GET parameter, places it into the update array, and calls wp_update_post(). This operation overwrites the target post’s title, content, author, post type and status. It also updates post metadata via update_post_meta(). The result is a full takeover of any post or page by an authenticated attacker with Subscriber-level access and above.

Affected Systems

WordPress sites that have the Rate Star Review Vote – AJAX Reviews, Votes, Star Ratings plugin installed at any version up to and including 1.6.4. The vendor is videowhisper. No specific hardware or operating system requirements are noted, as the vulnerability exists in the WordPress plugin code.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, but exploitation requires only a logged‑in Subscriber or higher role; the vulnerability is not currently listed in CISA KEV and no EPSS score is available. The likely attack vector is an authenticated user making a direct AJAX request with a crafted rating_id parameter, which can be performed from any browser session once the attacker has a legitimate account. An attacker can replace content, change authorship, and alter post types, leading to data integrity and authenticity violations across the site.

Generated by OpenCVE AI on May 12, 2026 at 10:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Rate Star Review Vote plugin to any version newer than 1.6.4, which incorporates proper capability checks and nonce verification for AJAX requests.
  • If an upgrade cannot be performed immediately, disable the vulnerable AJAX endpoint by removing the vwrsr_review action hooks (wp_ajax_nopriv_vwrsr_review and wp_ajax_vwrsr_review) or by deactivating the plugin's review voting feature in the WordPress admin settings.
  • Restrict the Subscriber role by tightening capabilities or removing the ability to post (e.g., using a role management plugin) so that only higher‑privileged users can interact with the plugin’s AJAX functionality.

Generated by OpenCVE AI on May 12, 2026 at 10:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Rate Star Review Vote - AJAX Reviews, Votes, Star Ratings plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. The vwrsr_review() AJAX handler lacks both capability checks and nonce verification. The only access control is an is_user_logged_in() check. When the 'form' parameter is set to 'update', the function takes an arbitrary post ID from the user-supplied 'rating_id' GET parameter, sets it as the post ID in the update array, and passes it directly to wp_update_post(). This overwrites the target post's title, content, author (changed to the attacker's user ID), post_type (changed to the plugin's custom post type, default 'review'), and status. Additionally, update_post_meta() is called on the arbitrary post ID at lines 758-763, modifying its metadata. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the title, content, author, post type, and metadata of arbitrary posts and pages on the site via the 'rating_id' parameter, effectively allowing full post content takeover.
Title Rate Star Review Vote <= 1.6.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Modification via 'rating_id' Parameter
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-12T12:56:54.390Z

Reserved: 2026-03-16T20:01:00.547Z

Link: CVE-2026-4301

cve-icon Vulnrichment

Updated: 2026-05-12T12:56:51.188Z

cve-icon NVD

Status : Deferred

Published: 2026-05-12T09:16:41.640

Modified: 2026-05-12T14:03:52.757

Link: CVE-2026-4301

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T10:30:13Z

Weaknesses