Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Starfishwp
Starfishwp starfish Review Generation & Marketing For Wordpress Wordpress Wordpress wordpress |
|
| Vendors & Products |
Starfishwp
Starfishwp starfish Review Generation & Marketing For Wordpress Wordpress Wordpress wordpress |
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Starfish Review Generation & Marketing for WordPress plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'srm_restore_options_defaults' function in all versions up to, and including, 3.1.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | |
| Title | Starfish Review Generation & Marketing for WordPress <= 3.1.19 - Authenticated (Subscriber+) Arbitrary Options Update via srm_restore_options_defaults | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-02-17T20:31:39.854Z
Reserved: 2025-12-27T18:33:56.380Z
Link: CVE-2025-15157
Updated: 2026-02-17T20:31:33.927Z
Status : Awaiting Analysis
Published: 2026-02-13T22:16:08.427
Modified: 2026-02-18T17:52:44.520
Link: CVE-2025-15157
No data.
OpenCVE Enrichment
Updated: 2026-02-16T12:03:26Z