Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13596: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pantherius WordPress Survey & Poll – Quiz, Survey and Poll Plugin for WordPress

0
Medium
VulnerabilityCVE-2024-13596cvecve-2024-13596cwe-89
Published: Thu Jan 30 2025 (01/30/2025, 13:42:06 UTC)
Source: CVE Database V5
Vendor/Project: pantherius
Product: WordPress Survey & Poll – Quiz, Survey and Poll Plugin for WordPress

Description

CVE-2024-13596 is a medium severity SQL Injection vulnerability in the WordPress Survey & Poll – Quiz, Survey and Poll Plugin affecting all versions up to 1. 7. 5. It allows authenticated users with Contributor-level or higher privileges to inject malicious SQL via the 'id' attribute of the 'survey' shortcode due to improper input sanitization and escaping. Exploitation can lead to unauthorized extraction of sensitive database information without requiring user interaction. The vulnerability does not impact integrity or availability but poses a significant confidentiality risk. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent data leakage. Countries with large WordPress user bases and active content creators are most at risk. The CVSS score is 6.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:28:45 UTC

Technical Analysis

CVE-2024-13596 identifies an SQL Injection vulnerability in the WordPress Survey & Poll – Quiz, Survey and Poll Plugin (versions up to and including 1.7.5). The flaw arises from improper neutralization of special elements in SQL commands (CWE-89), specifically due to insufficient escaping of the user-supplied 'id' parameter within the 'survey' shortcode. This vulnerability allows authenticated users with Contributor-level access or higher to append arbitrary SQL queries to existing database queries. Because the plugin fails to properly prepare or sanitize these inputs, attackers can exploit this to extract sensitive information from the WordPress database, such as user data or site configuration details. The attack vector requires no user interaction beyond authentication, and the vulnerability is remotely exploitable over the network. The CVSS 3.1 score of 6.5 reflects a medium severity, with network attack vector, low attack complexity, and privileges required at the contributor level. While no known exploits have been reported in the wild, the vulnerability poses a significant risk to confidentiality. The plugin is widely used in WordPress environments for surveys and polls, making many sites potentially vulnerable until patched. The absence of a patch link indicates that a fix may not yet be publicly available, increasing the urgency for mitigation measures.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive information stored in the WordPress database. Attackers with contributor-level access can exploit the SQL Injection to extract data such as user credentials, personal information, or site configuration details, potentially leading to privacy violations and further attacks. Although the vulnerability does not directly affect data integrity or availability, the confidentiality breach can undermine trust and compliance with data protection regulations. Organizations relying on this plugin for user engagement risk exposure of sensitive data, which could result in reputational damage and legal consequences. Since the attack requires authenticated access, the threat is somewhat limited to insiders or compromised accounts, but the ease of exploitation and lack of user interaction needed increase the risk. The vulnerability affects all sites using the plugin up to version 1.7.5, which may include a significant number of WordPress installations worldwide.

Mitigation Recommendations

1. Immediately restrict Contributor-level and higher privileges to trusted users only, minimizing the risk of exploitation from compromised accounts. 2. Monitor database logs and web application logs for unusual or suspicious SQL queries that may indicate exploitation attempts. 3. Implement Web Application Firewall (WAF) rules to detect and block SQL Injection patterns targeting the 'id' parameter in the 'survey' shortcode. 4. Apply strict input validation and sanitization on all user-supplied parameters related to the plugin, especially the 'id' attribute, using parameterized queries or prepared statements if possible. 5. Regularly update the plugin once a security patch is released by the vendor; subscribe to vendor advisories to stay informed. 6. Consider temporarily disabling the plugin if it is not critical to operations until a patch is available. 7. Conduct a thorough audit of user privileges and remove unnecessary contributor or higher-level accounts. 8. Educate site administrators and content creators about the risks of SQL Injection and the importance of secure plugin management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-21T15:22:17.534Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e63b7ef31ef0b59f5a1

Added to database: 2/25/2026, 9:49:23 PM

Last enriched: 2/25/2026, 11:28:45 PM

Last updated: 2/26/2026, 9:42:56 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats