Description
The WPQuiz plugin for WordPress is vulnerable to SQL Injection via the 'id' attribute of the 'wpquiz' shortcode in all versions up to, and including, 0.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2025-07-04
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection leading to data extraction
Action: Immediate Update
AI Analysis

Impact

The WPQuiz plugin for WordPress contains a SQL Injection flaw in the handling of the 'id' attribute in the 'wpquiz' shortcode. Because the plugin fails to properly escape user‐supplied data before embedding it in an existing SQL statement, an attacker can append arbitrary SQL queries. This allows the attacker to read sensitive data from the database, compromising confidentiality. The weakness is a classic injection flaw (CWE-89).

Affected Systems

Vulnerable versions of the WPQuiz plugin up to and including 0.4.2 are affected. The plugin is available from the bauc provider in the WordPress ecosystem and is distributed under the WordPress plugin repository. Systems with any WordPress site running these plugin versions can be impacted.

Risk and Exploitability

The vulnerability receives a CVSS base score of 6.5, indicating moderate severity, and an EPSS score of less than 1%, reflecting a low likelihood of exploitation at present. It is not listed in the CISA KEV catalog. The attack requires authentication and a minimum contributor-level role, so it is not publicly exploitable. Successful exploitation would enable the attacker to execute read‑only queries that expose private database contents.

Generated by OpenCVE AI on April 22, 2026 at 14:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WPQuiz to the latest version (0.4.3 or newer).
  • If an upgrade cannot be performed immediately, disable the usage of the wpquiz shortcode or enforce strict input validation on the 'id' parameter.
  • Restrict the role that can use the plugin by configuring WordPress permissions so that only administrators can invoke the wpquiz shortcode.

Generated by OpenCVE AI on April 22, 2026 at 14:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19926 The WPQuiz plugin for WordPress is vulnerable to SQL Injection via the 'id' attribute of the 'wpquiz' shortcode in all versions up to, and including, 0.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
History

Wed, 09 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Bauc
Bauc wpquiz
CPEs cpe:2.3:a:bauc:wpquiz:*:*:*:*:*:wordpress:*:*
Vendors & Products Bauc
Bauc wpquiz

Tue, 08 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 04 Jul 2025 02:30:00 +0000

Type Values Removed Values Added
Description The WPQuiz plugin for WordPress is vulnerable to SQL Injection via the 'id' attribute of the 'wpquiz' shortcode in all versions up to, and including, 0.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title WPQuiz <= 0.4.2 - Authenticated (Contributor+) SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:37:07.204Z

Reserved: 2025-06-26T16:43:22.986Z

Link: CVE-2025-6739

cve-icon Vulnrichment

Updated: 2025-07-08T14:29:14.508Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-04T03:15:22.740

Modified: 2025-07-09T17:48:53.153

Link: CVE-2025-6739

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:45:19Z

Weaknesses