CVE-2025-7327

WordPress · WordPress Widget for Google Reviews plugin

A high-severity Directory Traversal vulnerability has been identified in the Widget for Google Reviews plugin for WordPress.

Executive summary

A high-severity Directory Traversal vulnerability has been identified in the Widget for Google Reviews plugin for WordPress. This flaw could allow an unauthenticated attacker to read sensitive files on the server, such as configuration files containing database credentials. Successful exploitation could lead to a full website compromise, data exposure, and significant operational disruption.

Vulnerability

The plugin fails to properly sanitize user-supplied input used in file path operations. An attacker can exploit this by crafting a malicious request containing "dot-dot-slash" (../) sequences to navigate outside of the intended directory. This allows the attacker to access and read arbitrary files on the server that are accessible by the web server's user account, potentially including sensitive files like wp-config.php, .htaccess, or system-level configuration files.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8, posing a significant risk to the organization. Exploitation could lead to the exposure of highly sensitive information, including database credentials, API keys, and internal server configurations. This could result in a complete compromise of the website, theft of customer or business data, reputational damage, and potential financial losses or regulatory penalties. The stolen information could also be used to facilitate further attacks against the organization's infrastructure.

Remediation

Immediate Action: Immediately update the "Widget for Google Reviews" plugin to the latest patched version via the WordPress administrative dashboard. It is recommended to test the update in a staging environment before deploying to production to ensure compatibility and functionality.

Proactive Monitoring: Monitor web server access logs (e.g., Apache, Nginx) for suspicious requests containing directory traversal patterns like ../, ..%2f, or other encoded variations in URL parameters. Implement file integrity monitoring to detect unauthorized access to or changes in critical files such as wp-config.php.

Compensating Controls: If immediate patching is not feasible, consider the following controls:

  • Disable the Plugin: Temporarily deactivate and disable the "Widget for Google Reviews" plugin until it can be safely updated.
  • Web Application Firewall (WAF): Implement or configure a WAF with rulesets designed to detect and block directory traversal attack patterns.
  • Harden File Permissions: Ensure that file and directory permissions on the web server are set according to the principle of least privilege, limiting the web server process's ability to read sensitive files outside of the web root.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the high CVSS score of 8.8 and the critical nature of the potential data exposure, this vulnerability should be treated as a high-priority threat. We strongly recommend that all WordPress sites using the "Widget for Google Reviews" plugin be patched immediately. While there is no current evidence of active exploitation, the risk profile will increase significantly as this vulnerability becomes more widely known. Organizations should apply the recommended remediation and compensating controls without delay to prevent potential compromise.