CVE-2025-12620: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ays-pro Poll Maker – Versus Polls, Anonymous Polls, Image Polls
The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to generic SQL Injection via the ‘filterbyauthor’ parameter in all versions up to, and including, 6.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-12620 identifies an SQL Injection vulnerability in the WordPress plugin 'Poll Maker – Versus Polls, Anonymous Polls, Image Polls' developed by ays-pro. The vulnerability arises from improper neutralization of special elements in the 'filterbyauthor' parameter, which is used in SQL queries without adequate escaping or prepared statements. This allows an authenticated attacker with Administrator-level privileges or higher to append arbitrary SQL commands to existing queries. The attack vector is network-based, requiring no user interaction but necessitating elevated privileges, limiting the attack surface to trusted users with admin access. The vulnerability impacts all versions up to and including 6.0.7 of the plugin. Exploiting this flaw can lead to unauthorized disclosure of sensitive information stored in the database, such as user data or configuration details, but does not allow modification or deletion of data, nor does it affect system availability. The CVSS v3.1 base score is 4.9, reflecting medium severity due to the requirement for high privileges and the limited scope of impact. No patches have been linked yet, and no known exploits are reported in the wild. The vulnerability is categorized under CWE-89, which covers SQL Injection issues stemming from improper input validation and query construction.
Potential Impact
For European organizations, this vulnerability poses a risk of sensitive data exposure if the affected plugin is used on WordPress sites, especially those managing polls or user-generated content. Since exploitation requires Administrator-level access, the threat mainly concerns insider threats or compromised admin accounts. Data leakage could include personally identifiable information (PII), internal configuration, or other sensitive database contents, potentially violating GDPR and other data protection regulations. The impact on confidentiality is high, but integrity and availability remain unaffected. Organizations relying on this plugin for public or internal polling services could face reputational damage and compliance issues if exploited. The absence of known exploits reduces immediate risk, but the presence of the vulnerability in widely deployed WordPress environments means attackers could develop exploits in the future. European companies with high WordPress usage and those in regulated sectors (finance, healthcare, government) should be particularly vigilant.
Mitigation Recommendations
Immediate mitigation should include restricting Administrator-level access to trusted personnel and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Organizations should monitor logs for unusual SQL query patterns or unexpected database access from admin accounts. Since no official patch is currently linked, administrators should consider temporarily disabling or removing the vulnerable plugin if feasible. Alternatively, applying manual code review and patching to sanitize the 'filterbyauthor' parameter using prepared statements or parameterized queries can mitigate the risk. Regular backups and database encryption can limit data exposure impact. Additionally, implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this parameter can provide a protective layer. Organizations should subscribe to vendor updates and apply official patches promptly once available.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland
CVE-2025-12620: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ays-pro Poll Maker – Versus Polls, Anonymous Polls, Image Polls
Description
The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to generic SQL Injection via the ‘filterbyauthor’ parameter in all versions up to, and including, 6.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Technical Analysis
CVE-2025-12620 identifies an SQL Injection vulnerability in the WordPress plugin 'Poll Maker – Versus Polls, Anonymous Polls, Image Polls' developed by ays-pro. The vulnerability arises from improper neutralization of special elements in the 'filterbyauthor' parameter, which is used in SQL queries without adequate escaping or prepared statements. This allows an authenticated attacker with Administrator-level privileges or higher to append arbitrary SQL commands to existing queries. The attack vector is network-based, requiring no user interaction but necessitating elevated privileges, limiting the attack surface to trusted users with admin access. The vulnerability impacts all versions up to and including 6.0.7 of the plugin. Exploiting this flaw can lead to unauthorized disclosure of sensitive information stored in the database, such as user data or configuration details, but does not allow modification or deletion of data, nor does it affect system availability. The CVSS v3.1 base score is 4.9, reflecting medium severity due to the requirement for high privileges and the limited scope of impact. No patches have been linked yet, and no known exploits are reported in the wild. The vulnerability is categorized under CWE-89, which covers SQL Injection issues stemming from improper input validation and query construction.
Potential Impact
For European organizations, this vulnerability poses a risk of sensitive data exposure if the affected plugin is used on WordPress sites, especially those managing polls or user-generated content. Since exploitation requires Administrator-level access, the threat mainly concerns insider threats or compromised admin accounts. Data leakage could include personally identifiable information (PII), internal configuration, or other sensitive database contents, potentially violating GDPR and other data protection regulations. The impact on confidentiality is high, but integrity and availability remain unaffected. Organizations relying on this plugin for public or internal polling services could face reputational damage and compliance issues if exploited. The absence of known exploits reduces immediate risk, but the presence of the vulnerability in widely deployed WordPress environments means attackers could develop exploits in the future. European companies with high WordPress usage and those in regulated sectors (finance, healthcare, government) should be particularly vigilant.
Mitigation Recommendations
Immediate mitigation should include restricting Administrator-level access to trusted personnel and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Organizations should monitor logs for unusual SQL query patterns or unexpected database access from admin accounts. Since no official patch is currently linked, administrators should consider temporarily disabling or removing the vulnerable plugin if feasible. Alternatively, applying manual code review and patching to sanitize the 'filterbyauthor' parameter using prepared statements or parameterized queries can mitigate the risk. Regular backups and database encryption can limit data exposure impact. Additionally, implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this parameter can provide a protective layer. Organizations should subscribe to vendor updates and apply official patches promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-02T16:28:40.451Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691579339e485ce1c4d841f5
Added to database: 11/13/2025, 6:22:43 AM
Last enriched: 11/13/2025, 6:27:13 AM
Last updated: 11/13/2025, 7:58:03 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack
MediumCVE-2024-7341: Session Fixation
HighCVE-2025-12891: CWE-862 Missing Authorization in ays-pro Survey Maker
MediumCVE-2025-12979: CWE-862 Missing Authorization in uscnanbu Welcart e-Commerce
MediumCVE-2025-12892: CWE-862 Missing Authorization in ays-pro Survey Maker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.