CVE-2024-13596: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pantherius WordPress Survey & Poll – Quiz, Survey and Poll Plugin for WordPress
CVE-2024-13596 is a medium severity SQL Injection vulnerability in the WordPress Survey & Poll – Quiz, Survey and Poll Plugin affecting all versions up to 1. 7. 5. It allows authenticated users with Contributor-level or higher privileges to inject malicious SQL via the 'id' attribute of the 'survey' shortcode due to improper input sanitization and escaping. Exploitation can lead to unauthorized extraction of sensitive database information without requiring user interaction. The vulnerability does not impact integrity or availability but poses a significant confidentiality risk. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent data leakage. Countries with large WordPress user bases and active content creators are most at risk. The CVSS score is 6.
AI Analysis
Technical Summary
CVE-2024-13596 identifies an SQL Injection vulnerability in the WordPress Survey & Poll – Quiz, Survey and Poll Plugin (versions up to and including 1.7.5). The flaw arises from improper neutralization of special elements in SQL commands (CWE-89), specifically due to insufficient escaping of the user-supplied 'id' parameter within the 'survey' shortcode. This vulnerability allows authenticated users with Contributor-level access or higher to append arbitrary SQL queries to existing database queries. Because the plugin fails to properly prepare or sanitize these inputs, attackers can exploit this to extract sensitive information from the WordPress database, such as user data or site configuration details. The attack vector requires no user interaction beyond authentication, and the vulnerability is remotely exploitable over the network. The CVSS 3.1 score of 6.5 reflects a medium severity, with network attack vector, low attack complexity, and privileges required at the contributor level. While no known exploits have been reported in the wild, the vulnerability poses a significant risk to confidentiality. The plugin is widely used in WordPress environments for surveys and polls, making many sites potentially vulnerable until patched. The absence of a patch link indicates that a fix may not yet be publicly available, increasing the urgency for mitigation measures.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive information stored in the WordPress database. Attackers with contributor-level access can exploit the SQL Injection to extract data such as user credentials, personal information, or site configuration details, potentially leading to privacy violations and further attacks. Although the vulnerability does not directly affect data integrity or availability, the confidentiality breach can undermine trust and compliance with data protection regulations. Organizations relying on this plugin for user engagement risk exposure of sensitive data, which could result in reputational damage and legal consequences. Since the attack requires authenticated access, the threat is somewhat limited to insiders or compromised accounts, but the ease of exploitation and lack of user interaction needed increase the risk. The vulnerability affects all sites using the plugin up to version 1.7.5, which may include a significant number of WordPress installations worldwide.
Mitigation Recommendations
1. Immediately restrict Contributor-level and higher privileges to trusted users only, minimizing the risk of exploitation from compromised accounts. 2. Monitor database logs and web application logs for unusual or suspicious SQL queries that may indicate exploitation attempts. 3. Implement Web Application Firewall (WAF) rules to detect and block SQL Injection patterns targeting the 'id' parameter in the 'survey' shortcode. 4. Apply strict input validation and sanitization on all user-supplied parameters related to the plugin, especially the 'id' attribute, using parameterized queries or prepared statements if possible. 5. Regularly update the plugin once a security patch is released by the vendor; subscribe to vendor advisories to stay informed. 6. Consider temporarily disabling the plugin if it is not critical to operations until a patch is available. 7. Conduct a thorough audit of user privileges and remove unnecessary contributor or higher-level accounts. 8. Educate site administrators and content creators about the risks of SQL Injection and the importance of secure plugin management.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-13596: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pantherius WordPress Survey & Poll – Quiz, Survey and Poll Plugin for WordPress
Description
CVE-2024-13596 is a medium severity SQL Injection vulnerability in the WordPress Survey & Poll – Quiz, Survey and Poll Plugin affecting all versions up to 1. 7. 5. It allows authenticated users with Contributor-level or higher privileges to inject malicious SQL via the 'id' attribute of the 'survey' shortcode due to improper input sanitization and escaping. Exploitation can lead to unauthorized extraction of sensitive database information without requiring user interaction. The vulnerability does not impact integrity or availability but poses a significant confidentiality risk. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent data leakage. Countries with large WordPress user bases and active content creators are most at risk. The CVSS score is 6.
AI-Powered Analysis
Technical Analysis
CVE-2024-13596 identifies an SQL Injection vulnerability in the WordPress Survey & Poll – Quiz, Survey and Poll Plugin (versions up to and including 1.7.5). The flaw arises from improper neutralization of special elements in SQL commands (CWE-89), specifically due to insufficient escaping of the user-supplied 'id' parameter within the 'survey' shortcode. This vulnerability allows authenticated users with Contributor-level access or higher to append arbitrary SQL queries to existing database queries. Because the plugin fails to properly prepare or sanitize these inputs, attackers can exploit this to extract sensitive information from the WordPress database, such as user data or site configuration details. The attack vector requires no user interaction beyond authentication, and the vulnerability is remotely exploitable over the network. The CVSS 3.1 score of 6.5 reflects a medium severity, with network attack vector, low attack complexity, and privileges required at the contributor level. While no known exploits have been reported in the wild, the vulnerability poses a significant risk to confidentiality. The plugin is widely used in WordPress environments for surveys and polls, making many sites potentially vulnerable until patched. The absence of a patch link indicates that a fix may not yet be publicly available, increasing the urgency for mitigation measures.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive information stored in the WordPress database. Attackers with contributor-level access can exploit the SQL Injection to extract data such as user credentials, personal information, or site configuration details, potentially leading to privacy violations and further attacks. Although the vulnerability does not directly affect data integrity or availability, the confidentiality breach can undermine trust and compliance with data protection regulations. Organizations relying on this plugin for user engagement risk exposure of sensitive data, which could result in reputational damage and legal consequences. Since the attack requires authenticated access, the threat is somewhat limited to insiders or compromised accounts, but the ease of exploitation and lack of user interaction needed increase the risk. The vulnerability affects all sites using the plugin up to version 1.7.5, which may include a significant number of WordPress installations worldwide.
Mitigation Recommendations
1. Immediately restrict Contributor-level and higher privileges to trusted users only, minimizing the risk of exploitation from compromised accounts. 2. Monitor database logs and web application logs for unusual or suspicious SQL queries that may indicate exploitation attempts. 3. Implement Web Application Firewall (WAF) rules to detect and block SQL Injection patterns targeting the 'id' parameter in the 'survey' shortcode. 4. Apply strict input validation and sanitization on all user-supplied parameters related to the plugin, especially the 'id' attribute, using parameterized queries or prepared statements if possible. 5. Regularly update the plugin once a security patch is released by the vendor; subscribe to vendor advisories to stay informed. 6. Consider temporarily disabling the plugin if it is not critical to operations until a patch is available. 7. Conduct a thorough audit of user privileges and remove unnecessary contributor or higher-level accounts. 8. Educate site administrators and content creators about the risks of SQL Injection and the importance of secure plugin management.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-21T15:22:17.534Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e63b7ef31ef0b59f5a1
Added to database: 2/25/2026, 9:49:23 PM
Last enriched: 2/25/2026, 11:28:45 PM
Last updated: 2/26/2026, 9:42:56 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.