CVE-2025-10679
Description
The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to arbitrary method calls in all versions up to, and including, 2.2.12. This is due to insufficient input validation in the bulkTenReviews function that allows user-controlled data to be passed directly to a variable function call mechanism. This makes it possible for unauthenticated attackers to call arbitrary PHP class methods that take no inputs or have default values, potentially leading to information disclosure or remote code execution depending on available methods and server configuration.
Affected products
1- Range: <=2.2.12
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- plugins.trac.wordpress.org/browser/reviewx/tags/2.2.7/app/Rest/Controllers/ReviewController.phpnvd
- plugins.trac.wordpress.org/browser/reviewx/tags/2.2.7/app/Services/ReviewService.phpnvd
- plugins.trac.wordpress.org/browser/reviewx/tags/2.2.7/app/Utilities/Helper.phpnvd
- plugins.trac.wordpress.org/browser/reviewx/tags/2.2.7/routes/api.phpnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/0935ede4-05bc-48a2-94a3-8d92002e02bbnvd
News mentions
0No linked articles in our index yet.