Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11238: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prasunsen Watu Quiz

0
High
VulnerabilityCVE-2025-11238cvecve-2025-11238cwe-79
Published: Sat Oct 25 2025 (10/25/2025, 05:31:18 UTC)
Source: CVE Database V5
Vendor/Project: prasunsen
Product: Watu Quiz

Description

The Watu Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTTP Referer header in versions less than, or equal to, 3.4.4 due to insufficient input sanitization and output escaping when the "Save source URL" option is enabled. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an user accesses an injected page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:52:53 UTC

Technical Analysis

CVE-2025-11238 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Watu Quiz plugin for WordPress, specifically in versions less than or equal to 3.4.4. The vulnerability stems from insufficient sanitization and output escaping of the HTTP Referer header when the plugin's 'Save source URL' option is enabled. This improper neutralization of input (CWE-79) allows unauthenticated attackers to inject arbitrary JavaScript code into quiz pages. When a user accesses an infected page, the malicious script executes in their browser context, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of the user. The vulnerability is exploitable remotely without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 score of 7.2 reflects a high-severity rating, with attack vector network-based, low attack complexity, no privileges required, no user interaction, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable plugin. No public exploits have been reported yet, but the vulnerability's characteristics make it a prime target for attackers once weaponized. The lack of official patches at the time of disclosure necessitates immediate mitigation steps by administrators. Given WordPress's extensive global usage and the popularity of quiz plugins for educational and marketing purposes, this vulnerability could impact a broad range of websites.

Potential Impact

The impact of CVE-2025-11238 is significant for organizations using the Watu Quiz plugin on WordPress sites. Successful exploitation can lead to the execution of arbitrary scripts in the context of site visitors, enabling attackers to hijack user sessions, steal sensitive information such as authentication cookies, perform unauthorized actions, or deliver further malware payloads. This compromises the confidentiality and integrity of user data and can damage organizational reputation. Since the vulnerability does not require authentication or user interaction, it can be exploited en masse by automated tools, increasing the risk of widespread attacks. The scope change in the CVSS vector suggests that the vulnerability could affect other components or users beyond the immediate plugin, potentially amplifying the damage. For organizations relying on Watu Quiz for quizzes, surveys, or educational content, this vulnerability threatens the trustworthiness and security of their web presence. Additionally, attackers could leverage this vulnerability as an initial foothold for more complex attacks, including phishing or lateral movement within compromised networks.

Mitigation Recommendations

To mitigate CVE-2025-11238, organizations should immediately disable the 'Save source URL' option in the Watu Quiz plugin if it is enabled, as this feature is directly linked to the vulnerability. Administrators should monitor for and apply any official patches or updates released by the plugin vendor as soon as they become available. In the absence of patches, implementing a Web Application Firewall (WAF) with custom rules to detect and block malicious payloads in the HTTP Referer header can reduce exploitation risk. Additionally, website owners should audit their sites for any suspicious scripts or injected content and conduct regular security scans. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts. Educating users about the risks of interacting with suspicious links and maintaining robust incident response plans will further enhance resilience. Finally, consider alternative quiz plugins with a strong security track record if timely patching is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-02T11:38:34.624Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fc626907185a1a52fd75fb

Added to database: 10/25/2025, 5:38:49 AM

Last enriched: 2/27/2026, 6:52:53 PM

Last updated: 3/26/2026, 8:21:50 AM

Views: 141

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses