Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»SQL Injection Flaw Affects 40,000 WordPress Sites
Cyber Security

SQL Injection Flaw Affects 40,000 WordPress Sites

Team-CWDBy Team-CWDFebruary 3, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


More than 40,000 WordPress sites using the Quiz and Survey Master plugin have been affected by a SQL injection vulnerability that allowed authenticated users to interfere with database queries.

The flaw existed in versions 10.3.1 and earlier and could be exploited by any logged-in user with Subscriber-level privileges or higher, increasing the risk of unauthorised data access.

Quiz and Survey Master, also known as QSM, is widely used to create quizzes, surveys and forms. Its feature set includes multimedia support and a drag-and-drop quiz builder, which has contributed to its large install base.

The vulnerability did not require administrative access, meaning a broad range of user accounts could potentially be abused to trigger the issue.

How The Vulnerability Exposed Site Databases

The vulnerability was located in a REST API function responsible for retrieving quiz question data. A request parameter named is_linking was assumed to be a numeric identifier and was inserted into a database query without proper validation. No sanitisation was applied before the value was combined with other question IDs and executed as part of an SQL statement.

This approach allowed a malicious user to supply specially crafted input containing additional SQL commands. Since the query was not built using a prepared statement, the database would process the injected content as part of the query itself, opening the door to data extraction or other unwanted actions.

Read more on WordPress plugin security: Critical WordPress Plugin Bugs Exploited En Masse

The issue has been assigned CVE-2025-67987. Although there is no indication that the vulnerability was actively exploited, its presence highlights the risks of trusting request data, even when it is not intended to be directly controlled by users.

Patch Released Following Responsible Disclosure

In an advisory published last week, Patchstack said the vulnerability was fixed in Quiz and Survey Master version 10.3.2.

The update mitigates the issue by forcing the is_linking parameter to be converted into an integer using intval, ensuring that only numeric values are processed by the database query.

The flaw was discovered and reported by Doan Dinh Van, a member of the Patchstack Alliance community.

Patchstack received the report on 21 November 2025 and notified the plugin vendor. The patched release was issued on December 4, 2025, with the advisory made public in late January 2026.

The incident reinforces the importance of input validation and the use of prepared statements when handling database queries in WordPress plugins.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
Next Article Password Reuse in Disguise: An Often-Missed Risky Workaround
Team-CWD
  • Website

Related Posts

Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Cyber Security

Sophos CISO on Software Flaws, Vendor Risk and Secure by Design

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Your information is on the dark web. What happens next?

January 13, 2026

Common Apple Pay scams, and how to stay safe

January 22, 2026

In memoriam: David Harley

November 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.