Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-4301— Rate Star Review Vote <= 1.6.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Modification via 'rating_id' Parameter

CVSS 4.3 · Medium EPSS 0.03% · P9

Affected Version Matrix 1

VendorProductVersion RangeStatus
videowhisperRate Star Review Vote – AJAX Reviews, Votes, Star Ratings≤ 1.6.4affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-4301

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Rate Star Review Vote <= 1.6.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Modification via 'rating_id' Parameter
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Rate Star Review Vote - AJAX Reviews, Votes, Star Ratings plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. The vwrsr_review() AJAX handler lacks both capability checks and nonce verification. The only access control is an is_user_logged_in() check. When the 'form' parameter is set to 'update', the function takes an arbitrary post ID from the user-supplied 'rating_id' GET parameter, sets it as the post ID in the update array, and passes it directly to wp_update_post(). This overwrites the target post's title, content, author (changed to the attacker's user ID), post_type (changed to the plugin's custom post type, default 'review'), and status. Additionally, update_post_meta() is called on the arbitrary post ID at lines 758-763, modifying its metadata. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the title, content, author, post type, and metadata of arbitrary posts and pages on the site via the 'rating_id' parameter, effectively allowing full post content takeover.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress plugin Rate Star Review Vote - AJAX Reviews, Votes, Star Ratings 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress等都是(WordPress)基金会的产品。WordPress是一套使用PHP语言开发的博客平台。effect等都是的产品。effect是一款用于添加图像效果的软件包。Aaron update等都是(Aaron)个人开发者的产品。update是一个库。 WordPress plugin Rate Star Review Vote - AJAX Reviews, Votes, Star Ratings 1.6.4及之前版本存在安全漏洞,该漏洞源于`vwrsr_review()` AJAX处理
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
videowhisperRate Star Review Vote – AJAX Reviews, Votes, Star Ratings 0 ~ 1.6.4 -

II. Public POCs for CVE-2026-4301

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-4301

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-4301

No comments yet


Leave a comment