CVE-2025-15157
Starfish · Starfish Review Generation & Marketing
The Starfish Review Generation & Marketing plugin for WordPress is vulnerable to privilege escalation due to a missing capability check in the `srm_restore_options_defaults` function.
Executive summary
A missing capability check in the Starfish Review Generation & Marketing plugin allows unauthorized users to modify site data, potentially leading to full privilege escalation.
Vulnerability
The vulnerability exists in the srm_restore_options_defaults function, which lacks a proper capability check. This allows authenticated attackers with minimal permissions (or unauthenticated attackers, depending on the implementation) to reset or modify plugin options, facilitating privilege escalation.
Business impact
Unauthorized data modification can disrupt marketing efforts and, more critically, allow an attacker to gain higher-level administrative permissions. With a CVSS score of 8.8, this vulnerability poses a high risk to site integrity and could lead to a complete takeover of the WordPress instance.
Remediation
Immediate Action: Update the Starfish Review Generation & Marketing plugin to the latest version immediately to apply the necessary authorization checks.
Proactive Monitoring: Review WordPress user roles and permissions for any unauthorized changes and monitor for unexpected resets in plugin configurations.
Compensating Controls: Employ a security plugin that monitors for unauthorized changes to the WordPress options table and alerts administrators of suspicious activity.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The high severity of this privilege escalation flaw necessitates immediate remediation. Administrators should verify that all users have only the minimum necessary permissions and apply the plugin update to prevent unauthorized administrative access.