Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10042: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ays-pro Quiz Maker

0
Medium
VulnerabilityCVE-2025-10042cvecve-2025-10042cwe-89
Published: Wed Sep 17 2025 (09/17/2025, 05:18:44 UTC)
Source: CVE Database V5
Vendor/Project: ays-pro
Product: Quiz Maker

Description

The Quiz Maker plugin for WordPress is vulnerable to SQL Injection via spoofed IP headers in all versions up to, and including, 6.7.0.56 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This is only exploitable in configurations where the server is set up to retrieve the IP from a user-supplied field like `X-Forwarded-For` and limit users by IP is enabled.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:02:22 UTC

Technical Analysis

CVE-2025-10042 is a SQL Injection vulnerability identified in the ays-pro Quiz Maker plugin for WordPress, affecting all versions up to and including 6.7.0.56. The root cause is insufficient escaping and lack of prepared statements when processing user-supplied IP address parameters, particularly those derived from HTTP headers such as X-Forwarded-For. When the server configuration relies on these headers to determine client IP addresses and enforces IP-based access restrictions, attackers can craft spoofed headers containing malicious SQL code. This code is appended to existing SQL queries executed by the plugin, allowing unauthorized extraction of sensitive information from the backend database. The vulnerability does not require authentication or user interaction but has a high attack complexity because it depends on specific server configurations. The CVSS 3.1 score of 5.9 reflects a network attack vector with no privileges required, high complexity, and impact limited to confidentiality without affecting integrity or availability. No public exploits have been reported yet, but the vulnerability poses a risk to sites using the affected plugin versions with IP-based restrictions enabled and relying on user-supplied IP headers.

Potential Impact

The primary impact of CVE-2025-10042 is unauthorized disclosure of sensitive data from the backend database of WordPress sites using the ays-pro Quiz Maker plugin under vulnerable configurations. Attackers can leverage this SQL Injection flaw to extract confidential information such as user data, quiz results, or other stored content, potentially leading to privacy violations and data breaches. Although the vulnerability does not allow modification or deletion of data, the exposure of sensitive information can facilitate further attacks, including phishing or credential theft. Organizations relying on IP-based access controls that use user-supplied headers are particularly at risk, as this configuration enables exploitation. The medium severity rating indicates a moderate risk, but the widespread use of WordPress and this plugin in educational, corporate, and public sectors means that a significant number of sites could be affected, especially if they have not hardened their server configurations. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks.

Mitigation Recommendations

To mitigate CVE-2025-10042, organizations should immediately review their WordPress installations using the ays-pro Quiz Maker plugin and upgrade to a patched version once available. In the absence of an official patch, administrators should disable IP-based user restrictions that rely on user-supplied headers such as X-Forwarded-For, or configure their web servers and proxies to sanitize or ignore these headers to prevent spoofing. Implementing web application firewalls (WAFs) with rules to detect and block SQL Injection attempts targeting IP header parameters can provide interim protection. Additionally, plugin developers and site administrators should adopt secure coding practices including the use of parameterized queries or prepared statements to prevent SQL Injection. Regular security audits and monitoring for unusual database queries or access patterns can help detect exploitation attempts early. Finally, educating administrators about the risks of trusting client-supplied headers for security decisions is critical to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-05T17:58:14.606Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cab09db62c8e2e63b2466d

Added to database: 9/17/2025, 12:59:09 PM

Last enriched: 2/27/2026, 6:02:22 PM

Last updated: 3/25/2026, 7:15:52 AM

Views: 158

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses