Description
The qnotsquiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'qnotsquiz_custom_start_text' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: 2025-10-24
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (script injection)
Action: Update
AI Analysis

Impact

The qnotsquiz plugin for WordPress is vulnerable to stored cross‑site scripting via the qnotsquiz_custom_start_text parameter, resulting from insufficient input sanitization and output escaping. This flaw enables an authenticated administrator to insert arbitrary JavaScript into pages, which will execute whenever any user views the affected page. The resulting compromise can lead to session hijacking, credential theft, phishing, or defacement, affecting the confidentiality, integrity, and availability of the site and potentially other sites in the same WordPress multisite network.

Affected Systems

The vulnerability impacts the qnotsquiz WordPress plugin produced by muniyandibg, affecting all released versions up to and including 1.0.0. The flaw is relevant only for multisite installations where WordPress’ unfiltered_html capability is disabled, which is the default configuration for most sites.

Risk and Exploitability

The CVSS score of 4.4 indicates low severity, and the EPSS score of less than 1% implies a low likelihood of exploitation at the time of this analysis. The vulnerability is not yet included in CISA’s KEV catalog. Attackers must first obtain administrator‑level access to the WordPress network, then submit a value that contains malicious script through the qnotsquiz_custom_start_text field. Once stored, the script will automatically run inside any user’s browser that loads the affected page, enabling the attacker to execute client‑side attacks. Because the flaw requires admin privileges, the window of opportunity is narrower than a full‑open vulnerability, but it still poses a risk to organizations that rely on unfiltered content feeds from the plugin.

Generated by OpenCVE AI on April 22, 2026 at 21:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the qnotsquiz plugin to version 1.0.1 or later if available, or remove the plugin entirely if it is not required.
  • If the plugin must remain, enable the WordPress unfiltered_html capability for the sites that need it, or modify the plugin’s code to ensure all user‑supplied content is properly sanitized and escaped before being stored or rendered.
  • Implement a content‑security‑policy header that disallows inline scripts for all users, to reduce the impact of any stored script that may still reach the browser.

Generated by OpenCVE AI on April 22, 2026 at 21:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 24 Oct 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Oct 2025 08:30:00 +0000

Type Values Removed Values Added
Description The qnotsquiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'qnotsquiz_custom_start_text' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Title qnotsquiz <= 1.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:33:53.622Z

Reserved: 2025-10-21T13:52:07.646Z

Link: CVE-2025-12016

cve-icon Vulnrichment

Updated: 2025-10-24T16:47:35.373Z

cve-icon NVD

Status : Deferred

Published: 2025-10-24T09:15:43.987

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12016

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T22:00:18Z

Weaknesses