CVE-2025-12016: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in muniyandibg qnotsquiz
The qnotsquiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'qnotsquiz_custom_start_text' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-12016 identifies a stored cross-site scripting vulnerability in the qnotsquiz plugin for WordPress, present in all versions up to and including 1.0.0. The vulnerability arises from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'qnotsquiz_custom_start_text' parameter. This flaw allows authenticated users with administrator privileges to inject arbitrary JavaScript code into pages on multi-site WordPress installations where the 'unfiltered_html' capability is disabled. When other users visit these injected pages, the malicious scripts execute in their browsers, potentially enabling session hijacking, privilege escalation, or other malicious actions. The vulnerability is scoped to multi-site environments and requires high privileges, limiting its exploitation surface. The CVSS 3.1 score is 4.4 (medium severity), reflecting network attack vector, high attack complexity, required privileges, no user interaction, and partial confidentiality and integrity impacts. No public exploits have been reported to date. The vulnerability was published on October 24, 2025, and no patches are currently linked, indicating that mitigation relies on configuration changes or plugin updates when available. The issue is categorized under CWE-79, a common web application security weakness related to cross-site scripting.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to those operating multi-site WordPress environments with the qnotsquiz plugin installed. Exploitation could lead to unauthorized script execution in users' browsers, enabling theft of session cookies, defacement, or redirection to malicious sites. This can compromise user confidentiality and integrity of web content, potentially damaging organizational reputation and trust. Since exploitation requires administrator-level access, the threat is heightened if internal accounts are compromised or insider threats exist. The impact is particularly relevant for sectors relying heavily on WordPress multi-site setups, such as media, education, and government agencies. Additionally, the absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks. The vulnerability's limitation to multi-site installations and disabled unfiltered_html reduces the affected population but still warrants attention in complex WordPress deployments common in Europe.
Mitigation Recommendations
1. Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as MFA to reduce risk of credential compromise. 2. Monitor and audit multi-site WordPress installations for unauthorized changes to the 'qnotsquiz_custom_start_text' parameter or suspicious script injections. 3. Temporarily disable or remove the qnotsquiz plugin on multi-site environments until a vendor patch or update is released. 4. Enable and enforce content security policies (CSP) to limit the execution of unauthorized scripts in browsers. 5. Review and adjust WordPress capabilities, particularly the 'unfiltered_html' setting, to minimize exposure. 6. Implement web application firewalls (WAF) with rules to detect and block XSS payloads targeting this parameter. 7. Educate administrators on the risks of injecting untrusted content and encourage safe content management practices. 8. Stay updated with vendor advisories and apply patches promptly once available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12016: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in muniyandibg qnotsquiz
Description
The qnotsquiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'qnotsquiz_custom_start_text' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-12016 identifies a stored cross-site scripting vulnerability in the qnotsquiz plugin for WordPress, present in all versions up to and including 1.0.0. The vulnerability arises from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'qnotsquiz_custom_start_text' parameter. This flaw allows authenticated users with administrator privileges to inject arbitrary JavaScript code into pages on multi-site WordPress installations where the 'unfiltered_html' capability is disabled. When other users visit these injected pages, the malicious scripts execute in their browsers, potentially enabling session hijacking, privilege escalation, or other malicious actions. The vulnerability is scoped to multi-site environments and requires high privileges, limiting its exploitation surface. The CVSS 3.1 score is 4.4 (medium severity), reflecting network attack vector, high attack complexity, required privileges, no user interaction, and partial confidentiality and integrity impacts. No public exploits have been reported to date. The vulnerability was published on October 24, 2025, and no patches are currently linked, indicating that mitigation relies on configuration changes or plugin updates when available. The issue is categorized under CWE-79, a common web application security weakness related to cross-site scripting.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to those operating multi-site WordPress environments with the qnotsquiz plugin installed. Exploitation could lead to unauthorized script execution in users' browsers, enabling theft of session cookies, defacement, or redirection to malicious sites. This can compromise user confidentiality and integrity of web content, potentially damaging organizational reputation and trust. Since exploitation requires administrator-level access, the threat is heightened if internal accounts are compromised or insider threats exist. The impact is particularly relevant for sectors relying heavily on WordPress multi-site setups, such as media, education, and government agencies. Additionally, the absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks. The vulnerability's limitation to multi-site installations and disabled unfiltered_html reduces the affected population but still warrants attention in complex WordPress deployments common in Europe.
Mitigation Recommendations
1. Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as MFA to reduce risk of credential compromise. 2. Monitor and audit multi-site WordPress installations for unauthorized changes to the 'qnotsquiz_custom_start_text' parameter or suspicious script injections. 3. Temporarily disable or remove the qnotsquiz plugin on multi-site environments until a vendor patch or update is released. 4. Enable and enforce content security policies (CSP) to limit the execution of unauthorized scripts in browsers. 5. Review and adjust WordPress capabilities, particularly the 'unfiltered_html' setting, to minimize exposure. 6. Implement web application firewalls (WAF) with rules to detect and block XSS payloads targeting this parameter. 7. Educate administrators on the risks of injecting untrusted content and encourage safe content management practices. 8. Stay updated with vendor advisories and apply patches promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-21T13:52:07.646Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fb3a1f0691a1b59916073a
Added to database: 10/24/2025, 8:34:39 AM
Last enriched: 10/31/2025, 9:06:15 AM
Last updated: 12/14/2025, 8:07:13 AM
Views: 169
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14649: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14648: Command Injection in DedeBIZ
MediumCVE-2025-14647: SQL Injection in code-projects Computer Book Store
MediumCVE-2025-14646: SQL Injection in code-projects Student File Management System
MediumCVE-2025-12696: CWE-862 Missing Authorization in HelloLeads CRM Form Shortcode
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.