Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11238: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prasunsen Watu Quiz

0
High
VulnerabilityCVE-2025-11238cvecve-2025-11238cwe-79
Published: Sat Oct 25 2025 (10/25/2025, 05:31:18 UTC)
Source: CVE Database V5
Vendor/Project: prasunsen
Product: Watu Quiz

Description

The Watu Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTTP Referer header in versions less than, or equal to, 3.4.4 due to insufficient input sanitization and output escaping when the "Save source URL" option is enabled. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an user accesses an injected page.

AI-Powered Analysis

AILast updated: 10/25/2025, 06:10:22 UTC

Technical Analysis

CVE-2025-11238 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Watu Quiz plugin for WordPress, specifically affecting versions up to and including 3.4.4. The vulnerability stems from insufficient input sanitization and output escaping of the HTTP Referer header when the plugin's "Save source URL" option is enabled. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code into pages generated by the plugin. When a user visits a page containing the injected script, the malicious code executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is notable because it does not require the attacker to be authenticated or for the victim to perform any special action beyond visiting the compromised page. The CVSS v3.1 score of 7.2 reflects a high severity, with an attack vector over the network, low attack complexity, no privileges required, no user interaction needed, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable plugin. The impact primarily affects confidentiality and integrity, with no direct availability impact. No public exploit code or active exploitation has been reported yet, but the vulnerability's characteristics make it a prime candidate for exploitation in the wild. The lack of a patch or update link in the provided data suggests that users should monitor vendor communications closely and consider temporary mitigations.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites with the Watu Quiz plugin enabled and the "Save source URL" option active. Exploitation could lead to unauthorized access to user sessions, theft of sensitive information such as login credentials or personal data, and potential defacement or manipulation of quiz content. This could undermine trust in educational platforms, corporate training portals, or any service using this plugin. The vulnerability's ability to be exploited without authentication increases the attack surface, allowing attackers to target a broad range of users indiscriminately. Additionally, the scope change in the CVSS vector indicates that the vulnerability could affect other components or users beyond the initial plugin context, potentially leading to wider compromise within affected websites. Given the widespread use of WordPress in Europe and the popularity of quiz plugins for e-learning and engagement, the risk to confidentiality and integrity is elevated. Organizations may face reputational damage, regulatory scrutiny under GDPR if personal data is compromised, and operational disruptions if user trust is eroded.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Watu Quiz plugin and verify the version in use. If the plugin version is 3.4.4 or earlier, and the "Save source URL" option is enabled, it is critical to disable this feature as a temporary mitigation until an official patch is released. Administrators should implement strict input validation and output encoding on HTTP headers, particularly the Referer header, to prevent script injection. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious Referer header payloads can provide an additional layer of defense. Regularly updating all WordPress plugins and core installations is essential to minimize exposure to known vulnerabilities. Monitoring web server logs for unusual Referer header values and anomalous user behavior can help detect attempted exploitation. Educating site administrators about the risks of enabling unnecessary features that process user-controlled input is also recommended. Finally, organizations should prepare incident response plans to quickly address any exploitation attempts and notify affected users in compliance with GDPR requirements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-02T11:38:34.624Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fc626907185a1a52fd75fb

Added to database: 10/25/2025, 5:38:49 AM

Last enriched: 10/25/2025, 6:10:22 AM

Last updated: 10/30/2025, 2:01:19 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats