CVE-2025-12620: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ays-pro Poll Maker – Versus Polls, Anonymous Polls, Image Polls
The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to generic SQL Injection via the ‘filterbyauthor’ parameter in all versions up to, and including, 6.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-12620 identifies a SQL Injection vulnerability in the WordPress plugin 'Poll Maker – Versus Polls, Anonymous Polls, Image Polls' developed by ays-pro. The vulnerability exists in all versions up to and including 6.0.7 and stems from improper neutralization of special elements in the 'filterbyauthor' parameter. Specifically, the plugin fails to sufficiently escape or prepare this user-supplied parameter before incorporating it into SQL queries. As a result, authenticated attackers with Administrator-level privileges or higher can append arbitrary SQL commands to existing queries. This can allow attackers to extract sensitive information from the underlying database, such as user data or configuration details. The vulnerability does not allow modification or deletion of data (integrity) nor does it impact availability. Exploitation requires no user interaction but does require high-level privileges, limiting the attack surface to trusted users who have already compromised administrator credentials or insider threats. There are no known public exploits or patches available at the time of publication. The CVSS v3.1 base score is 4.9, reflecting a medium severity rating due to the combination of network attack vector, low attack complexity, required privileges, and high confidentiality impact. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command).
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive information stored in the WordPress database. Attackers with administrator access can leverage this flaw to extract confidential data, potentially including user credentials, personal information, or site configuration details. Although the vulnerability does not allow data modification or service disruption, the exposure of sensitive data can lead to further attacks such as privilege escalation, identity theft, or targeted phishing campaigns. Organizations running WordPress sites with this plugin installed are at risk, especially if administrator credentials are compromised or insider threats exist. The medium severity rating reflects the limited attack vector (authenticated admins only) but significant confidentiality impact. The lack of known exploits reduces immediate risk, but the vulnerability could be weaponized if exploited in the wild. This threat is particularly relevant for websites relying on polling functionality for user engagement, including political campaigns, market research, or community feedback platforms.
Mitigation Recommendations
1. Immediately restrict administrator-level access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor database query logs for unusual or unexpected SQL commands that may indicate attempted exploitation of this vulnerability. 3. Disable or uninstall the 'Poll Maker – Versus Polls, Anonymous Polls, Image Polls' plugin if it is not essential to reduce the attack surface. 4. Apply security hardening measures on the WordPress installation, including regular updates of core, themes, and plugins once a patch for this vulnerability is released. 5. If a patch is not yet available, consider implementing web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'filterbyauthor' parameter. 6. Conduct regular security audits and penetration tests focusing on plugins and custom code to identify similar injection flaws. 7. Educate administrators on the risks of SQL injection and the importance of secure coding and parameter handling in plugins.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2025-12620: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ays-pro Poll Maker – Versus Polls, Anonymous Polls, Image Polls
Description
The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to generic SQL Injection via the ‘filterbyauthor’ parameter in all versions up to, and including, 6.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12620 identifies a SQL Injection vulnerability in the WordPress plugin 'Poll Maker – Versus Polls, Anonymous Polls, Image Polls' developed by ays-pro. The vulnerability exists in all versions up to and including 6.0.7 and stems from improper neutralization of special elements in the 'filterbyauthor' parameter. Specifically, the plugin fails to sufficiently escape or prepare this user-supplied parameter before incorporating it into SQL queries. As a result, authenticated attackers with Administrator-level privileges or higher can append arbitrary SQL commands to existing queries. This can allow attackers to extract sensitive information from the underlying database, such as user data or configuration details. The vulnerability does not allow modification or deletion of data (integrity) nor does it impact availability. Exploitation requires no user interaction but does require high-level privileges, limiting the attack surface to trusted users who have already compromised administrator credentials or insider threats. There are no known public exploits or patches available at the time of publication. The CVSS v3.1 base score is 4.9, reflecting a medium severity rating due to the combination of network attack vector, low attack complexity, required privileges, and high confidentiality impact. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command).
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive information stored in the WordPress database. Attackers with administrator access can leverage this flaw to extract confidential data, potentially including user credentials, personal information, or site configuration details. Although the vulnerability does not allow data modification or service disruption, the exposure of sensitive data can lead to further attacks such as privilege escalation, identity theft, or targeted phishing campaigns. Organizations running WordPress sites with this plugin installed are at risk, especially if administrator credentials are compromised or insider threats exist. The medium severity rating reflects the limited attack vector (authenticated admins only) but significant confidentiality impact. The lack of known exploits reduces immediate risk, but the vulnerability could be weaponized if exploited in the wild. This threat is particularly relevant for websites relying on polling functionality for user engagement, including political campaigns, market research, or community feedback platforms.
Mitigation Recommendations
1. Immediately restrict administrator-level access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor database query logs for unusual or unexpected SQL commands that may indicate attempted exploitation of this vulnerability. 3. Disable or uninstall the 'Poll Maker – Versus Polls, Anonymous Polls, Image Polls' plugin if it is not essential to reduce the attack surface. 4. Apply security hardening measures on the WordPress installation, including regular updates of core, themes, and plugins once a patch for this vulnerability is released. 5. If a patch is not yet available, consider implementing web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'filterbyauthor' parameter. 6. Conduct regular security audits and penetration tests focusing on plugins and custom code to identify similar injection flaws. 7. Educate administrators on the risks of SQL injection and the importance of secure coding and parameter handling in plugins.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-02T16:28:40.451Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691579339e485ce1c4d841f5
Added to database: 11/13/2025, 6:22:43 AM
Last enriched: 2/27/2026, 8:49:07 PM
Last updated: 3/26/2026, 11:09:24 AM
Views: 115
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.