ReviewX WordPress Plugin Arbitrary Method Call Vulnerability
The ReviewX WordPress plugin is vulnerable to arbitrary method calls, allowing unauthenticated attackers to potentially achieve remote code execution.
The ReviewX – WooCommerce Product Reviews plugin for WordPress, a tool designed to enhance product reviews, contains a critical vulnerability. Identified as CVE-2025-10679, this flaw stems from insufficient input validation within the bulkTenReviews function. Exploitation allows unauthenticated attackers to invoke arbitrary PHP class methods that either require no input or can utilize default values. This vulnerability affects ReviewX plugin versions up to and including 2.2.12. Successful exploitation can lead to sensitive information disclosure or, under certain server configurations and available methods, remote code execution. This poses a significant risk to e-commerce sites utilizing the vulnerable plugin, potentially impacting customer data and overall site integrity.
Attack Chain
- The attacker sends a crafted HTTP request to the WordPress server targeting the vulnerable
bulkTenReviewsfunction in the ReviewX plugin. - The crafted request includes malicious input designed to bypass the insufficient input validation within the
bulkTenReviewsfunction. - The
bulkTenReviewsfunction processes the attacker-controlled data without proper sanitization. - The unsanitized input is passed to a variable function call mechanism, allowing the attacker to specify an arbitrary PHP class method.
- The attacker leverages this vulnerability to call a PHP class method that requires no inputs or has default values.
- Depending on the available methods and server configuration, the attacker may be able to trigger sensitive information disclosure.
- In more critical scenarios, the attacker might be able to call methods that allow writing to the file system or executing arbitrary commands, leading to remote code execution.
- The attacker gains control of the WordPress server, enabling them to install malware, steal data, or deface the website.
Impact
Successful exploitation of CVE-2025-10679 can lead to a range of damaging consequences. Sensitive information, such as customer data and administrative credentials, may be exposed. In the worst-case scenario, attackers can achieve remote code execution, granting them complete control over the affected WordPress server. This can result in website defacement, data theft, malware installation, and denial-of-service attacks. Given the wide usage of WooCommerce and ReviewX, a successful widespread attack could impact numerous e-commerce businesses.
Recommendation
- Immediately update the ReviewX plugin to the latest version (greater than 2.2.12) to patch CVE-2025-10679.
- Deploy the Sigma rule
Detect ReviewX Arbitrary Method Callsto detect exploitation attempts targeting thebulkTenReviewsfunction. - Monitor web server logs for suspicious POST requests to WordPress plugins with unusual parameters, as highlighted in the Sigma rule
Detect ReviewX Arbitrary Method Calls. - Review PHP configurations to harden against potential RCE attempts stemming from arbitrary method calls.
Detection coverage 2
Detect ReviewX Arbitrary Method Calls
highDetects potential exploitation attempts targeting the ReviewX plugin's arbitrary method call vulnerability (CVE-2025-10679) by monitoring for suspicious POST requests to the bulkTenReviews function.
Detect ReviewX Arbitrary Method Calls RCE via PHP
criticalDetects potential remote code execution attempts after initial arbitrary method call.
Detection queries are kept inside the platform. Get full rules →