Impact
The vulnerability resides in the Quiz Maker WordPress plugin up to version 6.7.0.56, where insufficient escaping of a user-supplied parameter allows attackers to inject additional SQL queries by spoofing IP‑header fields. Attackers can append malicious statements to existing queries and read sensitive database contents without authentication. The flaw is a classic SQL Injection (CWE‑89).
Affected Systems
Affected systems are installations of the ays‑pro Quiz Maker plugin running on WordPress, specifically versions 6.7.0.56 and earlier. Any WordPress site that employs this plugin and has IP‑based limiting enabled, pulling the client IP from headers such as X‑Forwarded‑For, is susceptible. Higher versions released after 6.7.0.56 contain the fix.
Risk and Exploitability
The CVSS score of 5.9 indicates a medium severity. The EPSS score of less than 1% reflects a very low likelihood of exploitation in the wild. The vulnerability is not currently listed in CISA’s KEV catalog. Attackers need only to craft a request with a forged IP header to leverage the flaw; no authentication or privileged access is required. The risk is confined to data leakage rather than full system compromise.
OpenCVE Enrichment
EUVD