CVE-2023-3575: CWE-79 Cross-Site Scripting (XSS) in Unknown Quiz And Survey Master
The Quiz And Survey Master WordPress plugin before 8.1.11 does not properly sanitize and escape question titles, which could allow users with the Contributor role and above to perform Stored Cross-Site Scripting attacks
AI Analysis
Technical Summary
CVE-2023-3575 is a medium-severity vulnerability identified in the WordPress plugin 'Quiz And Survey Master' prior to version 8.1.11. The issue is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79. It arises because the plugin does not properly sanitize and escape question titles submitted by users with Contributor role or higher. This improper input handling allows an attacker with at least Contributor privileges to inject malicious JavaScript code into question titles. When other users, including administrators or site visitors, view these questions, the malicious script executes in their browsers. The vulnerability requires authenticated access with Contributor-level privileges, which is a relatively low privilege level in WordPress, allowing many registered users to potentially exploit it. The attack vector is remote and requires user interaction (viewing the malicious content). The vulnerability impacts confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized actions performed in the context of the victim's browser session. Availability is not directly impacted. The CVSS v3.1 base score is 5.4 (medium), reflecting the moderate impact and exploitation complexity. No known public exploits have been reported in the wild as of the publication date. The vulnerability affects all versions before 8.1.11, and no official patch links were provided in the source information, but upgrading to 8.1.11 or later is implied as the remediation step.
Potential Impact
For European organizations using WordPress websites with the Quiz And Survey Master plugin, this vulnerability poses a risk of persistent XSS attacks that can compromise user accounts, including those of site administrators. This can lead to unauthorized access, data leakage, or manipulation of site content. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, may face compliance risks if user data is exposed or manipulated. Additionally, compromised websites can be used to distribute malware or phishing content, damaging organizational reputation and trust. Since Contributor-level access is sufficient to exploit the vulnerability, insider threats or compromised user accounts can be leveraged by attackers. The impact is heightened for organizations that allow user-generated content or have multiple contributors managing quizzes and surveys. However, the lack of known active exploitation reduces immediate risk, though the vulnerability should be addressed promptly to prevent future attacks.
Mitigation Recommendations
1. Immediate upgrade of the Quiz And Survey Master plugin to version 8.1.11 or later where the vulnerability is fixed. 2. Restrict Contributor role permissions to trusted users only, and review user roles to minimize unnecessary privileges. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns related to script injection in question titles. 4. Conduct regular security audits and vulnerability scans specifically targeting WordPress plugins and user input sanitization. 5. Educate site administrators and contributors about the risks of XSS and safe content management practices. 6. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 7. Monitor logs for unusual activity or repeated failed attempts to inject scripts. 8. If upgrading immediately is not feasible, temporarily disable quiz or survey creation/editing by Contributor roles until patched. These steps go beyond generic advice by focusing on role management, WAF tuning, and CSP implementation tailored to this plugin's context.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2023-3575: CWE-79 Cross-Site Scripting (XSS) in Unknown Quiz And Survey Master
Description
The Quiz And Survey Master WordPress plugin before 8.1.11 does not properly sanitize and escape question titles, which could allow users with the Contributor role and above to perform Stored Cross-Site Scripting attacks
AI-Powered Analysis
Technical Analysis
CVE-2023-3575 is a medium-severity vulnerability identified in the WordPress plugin 'Quiz And Survey Master' prior to version 8.1.11. The issue is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79. It arises because the plugin does not properly sanitize and escape question titles submitted by users with Contributor role or higher. This improper input handling allows an attacker with at least Contributor privileges to inject malicious JavaScript code into question titles. When other users, including administrators or site visitors, view these questions, the malicious script executes in their browsers. The vulnerability requires authenticated access with Contributor-level privileges, which is a relatively low privilege level in WordPress, allowing many registered users to potentially exploit it. The attack vector is remote and requires user interaction (viewing the malicious content). The vulnerability impacts confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized actions performed in the context of the victim's browser session. Availability is not directly impacted. The CVSS v3.1 base score is 5.4 (medium), reflecting the moderate impact and exploitation complexity. No known public exploits have been reported in the wild as of the publication date. The vulnerability affects all versions before 8.1.11, and no official patch links were provided in the source information, but upgrading to 8.1.11 or later is implied as the remediation step.
Potential Impact
For European organizations using WordPress websites with the Quiz And Survey Master plugin, this vulnerability poses a risk of persistent XSS attacks that can compromise user accounts, including those of site administrators. This can lead to unauthorized access, data leakage, or manipulation of site content. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, may face compliance risks if user data is exposed or manipulated. Additionally, compromised websites can be used to distribute malware or phishing content, damaging organizational reputation and trust. Since Contributor-level access is sufficient to exploit the vulnerability, insider threats or compromised user accounts can be leveraged by attackers. The impact is heightened for organizations that allow user-generated content or have multiple contributors managing quizzes and surveys. However, the lack of known active exploitation reduces immediate risk, though the vulnerability should be addressed promptly to prevent future attacks.
Mitigation Recommendations
1. Immediate upgrade of the Quiz And Survey Master plugin to version 8.1.11 or later where the vulnerability is fixed. 2. Restrict Contributor role permissions to trusted users only, and review user roles to minimize unnecessary privileges. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns related to script injection in question titles. 4. Conduct regular security audits and vulnerability scans specifically targeting WordPress plugins and user input sanitization. 5. Educate site administrators and contributors about the risks of XSS and safe content management practices. 6. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 7. Monitor logs for unusual activity or repeated failed attempts to inject scripts. 8. If upgrading immediately is not feasible, temporarily disable quiz or survey creation/editing by Contributor roles until patched. These steps go beyond generic advice by focusing on role management, WAF tuning, and CSP implementation tailored to this plugin's context.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-07-10T09:02:10.344Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf5059
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 10:38:03 AM
Last updated: 7/28/2025, 7:14:42 PM
Views: 12
Related Threats
CVE-2025-53631: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DogukanUrker flaskBlog
MediumCVE-2025-8964: Improper Authentication in code-projects Hostel Management System
MediumCVE-2025-7971: CWE-20: Improper Input Validation in Rockwell Automation Studio 5000 Logix Designer®
HighCVE-2025-40758: CWE-347: Improper Verification of Cryptographic Signature in Siemens Mendix SAML (Mendix 10.12 compatible)
HighCVE-2025-36613: CWE-266: Incorrect Privilege Assignment in Dell SupportAssist for Home PCs
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.